WorldWideScience

Sample records for environmental security research

  1. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  2. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  3. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  4. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  5. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  6. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  7. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).

  8. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  9. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  10. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  11. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  12. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  13. Theoretical Aspects of Analysis of International Environmental Security

    Directory of Open Access Journals (Sweden)

    Juliya A. Rusakova

    2015-01-01

    Full Text Available Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. Dealing with this issue is of outmost importance since its failure will render all other issues and challenges as negligible. The article examines the theoretical aspects of solving the problem of environmental security. In particular, it analyzes the problem of negative social externalities, and the related concept of "tragedy of the commons." These problems create a fundamental obstacle to the implementation of environmental security at the global level. Traditionally, the problem of externalities in the environmental field have been approached economically, states and their manufacturers were to pay for the externalities in the form of additional taxes. However, experience shows that the economic tools of dealing with environmental security are not effective. The author suggests alternative non-economic approaches: strengthening and developing the system of permanent institutions of international negotiations on environmental security and promotion of environmental awareness. Solving the acute environmental problems is impossible without a change of the political philosophy of the ruling elites in most states.

  14. The effects of environmental resource and security on aggressive behavior.

    Science.gov (United States)

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  15. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  16. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  17. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  18. Women's Environmental Literacy As Social Capital In Environmental Management For Environmental Security of Urban Area

    Science.gov (United States)

    Asteria, Donna; Herdiansyah, Herdis; Wayan Agus Apriana, I.

    2016-02-01

    This study is about experience of women's role in environmental management to raise environmental security and form of women's emancipation movement. Environmental concerns conducted by residents of urban women who become environmental activists based on environmental literacy. Because of that, women's experience in interacting with both physic and social environment have differences in managing the environment including managing household waste by applying the principles of the 3Rs (reduce, reuse, recycle) and their persuasive efforts on their communities. This is the key to achieving sustainable development by anticipating environmental problem and preserving the environment. This study is conducted qualitative research method and its type is descriptive-explanative. The result of this study is environmental literacy of women activist on pro-environment action in their community that has achieved spiritual environmental literacy. Environmental literacy may differ due to internal and external condition of each individual. Pro-environment activities conducted as a form of responsibility of environmental concern such as eco-management, educational, and economic action, by persuading residents to proactively and consistently continue to do environmental management and develop a sense of community in shaping the networks of environmental concern in local context for global effect.

  19. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  20. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    Science.gov (United States)

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  2. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  3. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  4. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  5. THE ENERGY COMPONENT OF THE ENVIRONMENTAL SECURITY: UKRAINE IN THE MIRROR

    Directory of Open Access Journals (Sweden)

    G. Kharlamova

    2015-03-01

    Full Text Available Energy security is important for any state. It is important for the state’s environment and economy. Ukraine is an energy dependent state, as well as an import-energy dependent one. The paper is devoted to the statistical analyses of Ukrainian energy sector from the position of its world representation. The purpose of this research is on the base of statistical analysis of current internal and external trends in the energy sector of Ukraine to consider possible mechanisms to stimulate and accelerate environmental-friendly energy security of Ukraine. Main objectives: to trace the dynamics of world and Ukrainian main energy indicators in the synergy with the state energy security index; to cluster launched efficiency-targeted energy projects in Ukraine in geoindustry aspect. Analyses of dynamics of energetic vs environmental performance of Ukraine in 2000–2014 world ranks shows that being in low segment of world rankings on aspects of energy and environmental security, Ukraine shows positive tendencies to the improvement, however with slow steps. In order to identify the most promising and most attractive sector of the economy in Ukraine to investors we held grouping of current launching energy-efficient projects in the aspect of industries and sectors where energy-efficient technologies operate. The rank analyses depicted that the most popular among economic sectors for energyefficiency investments are enterprises of agriculture and consumer goods industry, and the most attractive regions of Ukraine for implementation of investments in energy efficient technologies are Ivano-Frankivsk, Luhansk and Kherson oblasts.

  6. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  7. Environmental security in North-West Russia

    International Nuclear Information System (INIS)

    Bjerke, S.

    1999-01-01

    The arms race and military security during the Cold War cost trillions of dollars. It has been claimed that the processes of disarmament, and the large-scale conversion from military to civilian production that is now under way, will be equally costly. This includes the cost of environmental clean up and other measures to deal with the environmental legacy of the Cold War. Norway strongly supports a holistic approach to environmental issues. The armed forces and military industry must also adapt to environmental demands and adopt the principles of modern environmental management. Our own defence forces have for some time been basing their choice of equipment partly on modern environmental criteria and are taking steps to remedy previous environmental damage. Field training and exercises are subject to stringent environmental restrictions. All along the former East-West divide the scope of military activity has been dramatically reduced. The time has come to focus more attention on military or arms-related environmental issues

  8. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  9. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  10. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  11. Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Amang Sudarsono

    2016-04-01

    Full Text Available Recently, disseminating latest sensory information regarding the status of environmental health in the surroundings of human life is one of very important circumstances which must be known by everyone. These circumstances should be accessible at anytime and anywhere by everyone through any type of end-user devices, both fixed and mobile devices, i.e., Desktop PCs, Laptop PCs, and Smartphones. Wireless Sensor Network (WSN is one of the networks which deals with data sensors distribution from sensor nodes to the gateway node toward a Data Center Server. However, there is a big possibility for many adversaries to intercept and even manipulate data sensors crossing the network. Hence, a secure data sensor exchange in the system would be strongly desirable. In this research, we propose an environmental health conditions monitoring system through WSN and its implementation with considering secure data sensor exchange within the network and secure data sensor access. This work may contribute to support a part of smart cities and take in part the Internet of Thing (IoT technology. In our proposed system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO and carbon dioxide (CO2 from sensor nodes. We keep the confidentiality and integrity of transmitted data sensors propagating through IEEE802.15.4-based communication toward a gateway node. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through a secure TCP/IP connection for permanently storing. At anytime and anywhere, only legitimated users who successfully pass-through an attribute-based authentication system are able to access the data sensors.

  12. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  13. Environmental research and environmental protection

    International Nuclear Information System (INIS)

    1975-01-01

    At the request of the Ministry for Research and Technology, the 'Arbeitsgemeinschaft der Grossforschungseinrichtungen' (AGF) presented in 1972 an information brochure called 'Activities in the field of environmental research and environmental protection', closely associated with the environmental programme of the Federal government (1971). The information brochure reports on those activities of the working group's members which are closely, or less closely, connected with questions concerning environmental research and protection, however, investments for the protection of the individual facilities in internal operation are excluded. The AGF programme 'Environmental research and environmental protection' comprises contributions, brought up to date, of member companies. From the 'AGF programme survey 1974' it contains 'Environmental research' as well as aspects of nuclear development with environmental relevance. Technologies not harmful to the environment developed by the research facilities are only mentioned very briefly. (orig.) [de

  14. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  15. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  16. Environmental security: The problems of Northwestern Russia

    International Nuclear Information System (INIS)

    Yablokov, A.V.

    1999-01-01

    The review of main existing environmental problems of North-West Russia covers the radioactive pollution, atmospheric pollution, destroying of the tundra and forest ecosystems, inland and water pollution, consequences of space activities. This region includes: Karelia and Komi republics; Yamalo-Nenetzk autonomous region; Murmansk; Leningrad and Vologda regions; White Sea; Southern and eastern parts of Barents Sea; eastern part of Kara Sea; and eastern part of the Baltic (Finnish Bay). The environmental situation in northwestern Russia is extremely unsafe. The fundamental reason for this situation is Soviet over-militarization in the past. There is an urgent need now to tackle the international environmental security in the Arctic and Scandinavian regions at least in two fields: 1. The existing radioactive pollution (mostly connected with military activities), and even more dangerous - the potential radioactive pollution of the Arctic and Scandinavia. 2. Atmospheric pollution (long distance transportation of pollutant, mostly sulphur dioxide and heavy metals, from melting factories on Kola Peninsula). Several other problems relating to the environmental security of the region (among them deforestation, oil/gas pollution of the ocean, development of the diamond industry) need international attention in the nearest future. It is unrealistic to think that Russia alone can overcome these long-standing problems in the foreseeable future: we need international support for this. But foreign money for solving our environmental problems is not the solution, firstly, because for environmental restoration and recovery Russia needs much more than the international community can allocate; secondly, because there is much money inside Russia (every month, during 1993-1996, up to two billions US dollars were flowing out from Russia to western banks). To utilize this money in a proper way, we drastically need international help to awaken the Russian public environmental awareness

  17. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  18. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  19. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  20. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  1. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  2. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  3. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  4. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  5. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  6. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  7. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  8. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  9. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  10. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  11. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  12. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  13. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  14. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  15. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  16. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  17. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  18. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... research awards providing a unique opportunity to enhance research skills and gain a fresh perspecve on crucial development issues. These one‐year, paid, ... programming through a research acvity focusing on agriculture and food security, specifically on the gender and social (equity) dimensions of ...

  19. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Science.gov (United States)

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  20. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  1. Nevada National Security Site Environmental Report 2016, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  2. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  3. FOOD SECURITY AND UNIVERSITY AGRICULTURAL STUDENTS ...

    African Journals Online (AJOL)

    OGA AMOLEGBE

    Food security and its relationship to sustainable agricultural and rural development have ... JOURNAL OF RESEARCH IN FORESTRY, WILDLIFE AND ENVIRONMENTAL VOLUME 6, No. ... environmental degradation, rapid changes in.

  4. Seven layers of security to help protect biomedical research facilities.

    Science.gov (United States)

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  5. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  6. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  7. Securing medical research: a cybersecurity point of view.

    Science.gov (United States)

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  8. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  9. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  10. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    . The Canadian International Food Security Research Fund(CIFSRF) is a program of Canada's International Development Research. Centre (IDRC) undertaken with the financial support of the. Government of Canada provided through Foreign ...

  11. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  12. Security of the electricity supply. The area of conflict between profitability and environmental compatibility

    International Nuclear Information System (INIS)

    Praktiknjo, Aaron

    2013-01-01

    The scope of the book is on the one hand support for the power industry defining investment and sales strategies that intend optimum supply security in the view of the customer and on the other hand the information for energy and environmental politicians demonstrating the conflict of objectives. The following issues are covered: technical and organizational aspects of electricity supply, theoretical background of the security of electricity supply, security of supply for economic sections, security of electricity supply for private households: theoretical microeconomic approach, security of electricity supply for private households: method of defined preferences, security of electricity supply in the context of climate protection and nuclear phase-out.

  13. [Research progress on remote sensing of ecological and environmental changes in the Three Gorges Reservoir area, China].

    Science.gov (United States)

    Teng, Ming-jun; Zeng, Li-xiong; Xiao, Wen-fa; Zhou, Zhi-xiang; Huang, Zhi-lin; Wang, Peng-cheng; Dian, Yuan-yong

    2014-12-01

    The Three Gorges Reservoir area (TGR area) , one of the most sensitive ecological zones in China, has dramatically changes in ecosystem configurations and services driven by the Three Gorges Engineering Project and its related human activities. Thus, understanding the dynamics of ecosystem configurations, ecological processes and ecosystem services is an attractive and critical issue to promote regional ecological security of the TGR area. The remote sensing of environment is a promising approach to the target and is thus increasingly applied to and ecosystem dynamics of the TGR area on mid- and macro-scales. However, current researches often showed controversial results in ecological and environmental changes in the TGR area due to the differences in remote sensing data, scale, and land-use/cover classification. Due to the complexity of ecological configurations and human activities, challenges still exist in the remote-sensing based research of ecological and environmental changes in the TGR area. The purpose of this review was to summarize the research advances in remote sensing of ecological and environmental changes in the TGR area. The status, challenges and trends of ecological and environmental remote-sensing in the TGR area were further discussed and concluded in the aspect of land-use/land-cover, vegetation dynamics, soil and water security, ecosystem services, ecosystem health and its management. The further researches on the remote sensing of ecological and environmental changes were proposed to improve the ecosystem management of the TGR area.

  14. Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.

    Science.gov (United States)

    Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H

    2018-04-29

    The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.

  15. Strategic Environmental Research and Development Project FY 1994: Assessing national remote sensing technologies for use in US Department of Energy Environmental Restoration Activities, Oak Ridge Solid Waste Storage Area 4 case study

    International Nuclear Information System (INIS)

    King, A.L.; Smyre, J.L.; Evers, T.K.

    1995-02-01

    During FY 1994, the Oak Ridge Environmental Restoration (ER) Remote Sensing Program teamed with members of the Oak Ridge National Security Program Office (NSPO), the Environmental Research Institute of Michigan (ERIM) under contract to the National Exploitation Laboratory (NEL), the Oak Ridge Waste Area Group 4 (WAG 4) ER Program, and the US Department of Energy (DOE), Offices of Technology Development, Nonproliferation and National Security, and Environmental Restoration, to conduct a test and demonstration of the uses of national remote sensing technologies at DOE hazardous waste sites located in Oak Ridge, Tennessee. Objectives of the Oak Ridge study were to determine if national remote sensing technologies are useful in conducting prescreening, characterization, and/or monitoring activities to expedite the clean-up process at hazardous waste sites and to cut clean-up costs wherever possible. This project was sponsored by the Strategic Environmental Research and Development Project (SERDP)

  16. Environmental Toxicology Research Facility

    Data.gov (United States)

    Federal Laboratory Consortium — Fully-equipped facilities for environmental toxicology researchThe Environmental Toxicology Research Facility (ETRF) located in Vicksburg, MS provides over 8,200 ft...

  17. WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

    OpenAIRE

    Ranjit Panigrahi; Kalpana Sharma; M.K. Ghose

    2013-01-01

    Wireless Sensor Network (WSN) has a huge range of applications such as battlefield, surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. T...

  18. Environmental reporting and accounting in Australia: Progress, prospects and research priorities

    Energy Technology Data Exchange (ETDEWEB)

    Dijk, Albert van, E-mail: albert.vandijk@anu.edu.au [Australian National University, Canberra, ACT (Australia); Mount, Richard [Bureau of Meteorology, Hobart, Tasmania (Australia); University of Tasmania, Hobart, Tasmania (Australia); Gibbons, Philip [Australian National University, Canberra, ACT (Australia); Vardon, Michael [Australian Bureau of Statistics, Belconnen, ACT (Australia); Canadell, Pep [CSIRO Marine and Atmospheric Research, Canberra, ACT (Australia)

    2014-03-01

    data sources, and (6) experimental accounting to pursue consistent, credible and relevant information structures and to identify new data requirements. Opportunities exist to make progress in each of these areas and help secure a more sustainable future. - Highlights: • Capacity to produce nation-wide environmental reports and accounts is reviewed. • Several reasons for the lack of environmental data can be identified. • Six priorities are suggested for research to help create better information.

  19. Environmental reporting and accounting in Australia: Progress, prospects and research priorities

    International Nuclear Information System (INIS)

    Dijk, Albert van; Mount, Richard; Gibbons, Philip; Vardon, Michael; Canadell, Pep

    2014-01-01

    sources, and (6) experimental accounting to pursue consistent, credible and relevant information structures and to identify new data requirements. Opportunities exist to make progress in each of these areas and help secure a more sustainable future. - Highlights: • Capacity to produce nation-wide environmental reports and accounts is reviewed. • Several reasons for the lack of environmental data can be identified. • Six priorities are suggested for research to help create better information

  20. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  1. Basic research for environmental restoration

    International Nuclear Information System (INIS)

    1990-12-01

    The Department of Energy (DOE) is in the midst of a major environmental restoration effort to reduce the health and environmental risks resulting from past waste management and disposal practices at DOE sites. This report describes research needs in environmental restoration and complements a previously published document, DOE/ER-0419, Evaluation of Mid-to-Long Term Basic Research for Environmental Restoration. Basic research needs have been grouped into five major categories patterned after those identified in DOE/ER-0419: (1) environmental transport and transformations; (2) advanced sampling, characterization, and monitoring methods; (3) new remediation technologies; (4) performance assessment; and (5) health and environmental effects. In addition to basic research, this document deals with education and training needs for environmental restoration. 2 figs., 6 tabs

  2. Basic research for environmental restoration

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-01

    The Department of Energy (DOE) is in the midst of a major environmental restoration effort to reduce the health and environmental risks resulting from past waste management and disposal practices at DOE sites. This report describes research needs in environmental restoration and complements a previously published document, DOE/ER-0419, Evaluation of Mid-to-Long Term Basic Research for Environmental Restoration. Basic research needs have been grouped into five major categories patterned after those identified in DOE/ER-0419: (1) environmental transport and transformations; (2) advanced sampling, characterization, and monitoring methods; (3) new remediation technologies; (4) performance assessment; and (5) health and environmental effects. In addition to basic research, this document deals with education and training needs for environmental restoration. 2 figs., 6 tabs.

  3. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  4. Environmental reporting and accounting in Australia: progress, prospects and research priorities.

    Science.gov (United States)

    van Dijk, Albert; Mount, Richard; Gibbons, Philip; Vardon, Michael; Canadell, Pep

    2014-03-01

    Despite strong demand for information to support the sustainable use of Australia's natural resources and conserve environmental values and despite considerable effort and investment, nation-wide environmental data collection and analysis remains a substantially unmet challenge. We review progress in producing national environmental reports and accounts, identify challenges and opportunities, and analyse the potential role of research in addressing these. Australia's low and concentrated population density and the short history since European settlement contribute to the lack of environmental data. There are additional factors: highly diverse data requirements and standards, disagreement on information priorities, poorly measurable management objectives, lack of coordination, over-reliance on researchers and businesses for data collection, lack of business engagement, and short-term, project-based activities. New opportunities have arisen to overcome some of these challenges: enhanced monitoring networks, standardisation, data management and modelling, greater commitment to share and integrate data, community monitoring, increasing acceptance of environmental and sustainability indicators, and progress in environmental accounting practices. Successes in generating climate, water and greenhouse gas information appear to be attributable to an unambiguous data requirement, considerable investment, and legislative instruments that enhance data sharing and create a clearly defined role for operational agencies. Based on the analysis presented, we suggest six priorities for research: (1) common definitions and standards for information that address management objectives, (2) ecological measures that are scalable from local to national level, (3) promotion of long-term data collection and reporting by researchers, (4) efficient satellite and sensor network technologies and data analysis methods, (5) environmental modelling approaches that can reconcile multiple data

  5. The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

    Directory of Open Access Journals (Sweden)

    Kenneth J. Knapp

    2007-03-01

    Full Text Available This study proposes using an established common body of knowledge (CBK as one means of organizing information security literature.  Consistent with calls for more relevant information systems (IS research, this industry-developed framework can motivate future research towards topics that are important to the security practitioner.  In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK.  Further, we distinguish articles as empirical research, frameworks, or tutorials.  Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal aspects of information security.  Specifically, this study identified a need for additional IS security research relating to applications development, physical security, operations security, and business continuity.  The CBK framework is inherently practitioner oriented and using it will promote relevancy by steering IS research towards topics important to practitioners.  This is important considering the frequent calls by prominent information systems scholars for more relevant research.  Few research frameworks have emerged from the literature that specifically classify the diversity of security threats and range of problems that businesses today face.  With the recent surge of interest in security, the need for a comprehensive framework that also promotes relevant research can be of great value.

  6. Eduroam: Secure WiFi roaming for education and research

    CSIR Research Space (South Africa)

    Miteff, S

    2012-10-01

    Full Text Available In this presentation the author introduces the Eduroam initiative, and explains how it combines existing wireless security technologies in a novel way, to enable secure global roaming for end users at university campuses and research institutions....

  7. 76 FR 5209 - Notice of Availability of the Environmental Assessment for New Low Security Beds

    Science.gov (United States)

    2011-01-28

    ...-security male criminal aliens. In accordance with the National Environmental Policy Act (NEPA) of 1969, the... initiative (known as the Criminal Alien Requirement), the BOP has identified a specific requirement to confine a population of approximately 1,000 low-security adult male inmates that are primarily criminal...

  8. Research award: Agriculture and Food Security | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research shows that appropriate food security interventions can improve ... sector within the context of increased productivity and reduction of post-harvest loss, rural ... The successful candidate will allocate 50% of his/her time for a research ... with a focus on agriculture;; Business administration and/or management, with a ...

  9. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  10. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed.

    2012-09-12

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  11. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  12. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  13. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  14. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  15. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  16. ENVIRONMENTAL INNOVATIVE BUSINESS SOLUTIONS AS A STRATEGIC FACTOR OF ECONOMIC SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    A. S. Senin

    2016-01-01

    Full Text Available The relevance of this work lies in the fact that it attempts to disclose the key theoretical and practical issues of economic security solutions, taking into account the problems of global transformations taking place in the global economy. As part of the article we have been studied various aspects that characterize global economic, environmental trends that will shape the future of modern civilization. The article also addresses the problem of exit from the raw model of the economy, the formation of economic mechanisms that take into account environmental costs, proposed internalization of environmental externalities.The purpose/goal. The purpose of this article and its main task is to systematize the areas of environmentally oriented development of economic entities, as well as the determination of the list of key provisions of environmental policies, which will ensure the further socio-economic development of Russia in line with the green economy.Methods. In this article, based on content analysis of theoretical and empirical basic conceptual provisions of economic security were formulated in the context of eco-oriented production, the transition to which world civilization is currently implementing. It was concluded that the economic, energy, environmental and social issues of sustainable development of modern civilization is directly linked, so the transition to ecooriented production is possible, firstly, it provided aggressive reduction of production and wasteful use of traditional hydrocarbon resources, and, secondly, on the condition of rational replacement of traditional energy sources with renewable energy.Results. This article outlines the basic solutions that can be used to provide environmentally responsible operation and development of Russian business and corporate structures. Also offered in the basic decisions that are to be included in the national environmental policy as a major incentive for the further transition to a

  17. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    Science.gov (United States)

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  18. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  19. Privacy and Security in Mobile Health (mHealth) Research.

    Science.gov (United States)

    Arora, Shifali; Yttri, Jennifer; Nilse, Wendy

    2014-01-01

    Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

  20. Handbook of Research on Environmental Taxation

    DEFF Research Database (Denmark)

    , their environmental and economic impact and, finally, the larger question of the role of taxation among other policy approaches to environmental protection. Intermixing theory with case studies, the Handbook offers readers lessons that can be applied around the world. It identifies key bodies of research for people......The Handbook of Research on Environmental Taxation captures the state of the art of research on environmental taxation. Written by 36 specialists in environmental taxation from 16 countries, it takes an interdisciplinary and international approach, focusing on issues that are universal to using...... taxation to achieve environmental goals. The Handbook explores the conceptual foundations of environmental taxation, essential elements for designing environmental tax measures, factors that influence the acceptance of environmental taxation, the variety of ways to implement environmental taxes...

  1. Toward an integrated approach to nutritional quality, environmental sustainability, and economic viability: research and measurement gaps.

    Science.gov (United States)

    Herforth, Anna; Frongillo, Edward A; Sassi, Franco; Mclean, Mireille Seneclauze; Arabi, Mandana; Tirado, Cristina; Remans, Roseline; Mantilla, Gilma; Thomson, Madeleine; Pingali, Prabhu

    2014-12-01

    Nutrition is affected by numerous environmental and societal causes. This paper starts with a simple framework based on three domains: nutritional quality, economic viability, and environmental sustainability, and calls for an integrated approach in research to simultaneously account for all three. It highlights limitations in the current understanding of each domain, and how they influence one another. Five research topics are identified: measuring the three domains (nutritional quality, economic viability, environmental sustainability); modeling across disciplines; furthering the analysis of food systems in relation to the three domains; connecting climate change and variability to nutritional quality; and increasing attention to inequities among population groups in relation to the three domains. For an integrated approach to be developed, there is a need to identify and disseminate available metrics, modeling techniques, and tools to researchers, practitioners, and policy makers. This is a first step so that a systems approach that takes into account potential environmental and economic trade-offs becomes the norm in analyzing nutrition and food-security patterns. Such an approach will help fill critical knowledge gaps and will guide researchers seeking to define and address specific research questions in nutrition in their wider socioeconomic and environmental contexts. © 2014 New York Academy of Sciences.

  2. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  3. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  4. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  5. Environmental Economics Research Strategy (2005)

    Science.gov (United States)

    This 2005 Environmental Economics Research Strategy outlines EPA’s research effort to provide the necessary behavioral science foundation for making decisions and designing environmental policies at the least cost to American businesses and consumers.

  6. Data management for environmental research

    International Nuclear Information System (INIS)

    Strand, R.H.

    1976-01-01

    The objective of managing environmental research data is to develop a resource sufficient for the study and potential solution of environmental problems. Consequently, environmnetal data management must include a broad spectrum of activities ranging from statistical analysis and modeling, through data set archiving to computer hardware procurement. This paper briefly summarizes the data management requirements for environmental research and the techniques and automated procedures which are currently used by the Environmental Sciences Division at Oak Ridge National Laboratory. Included in these requirements are readily retrievable data, data indexed by categories for retrieval and application, data documentation (including collection methods), design and error bounds, easily used analysis and display programs, and file manipulation routines. The statistical analysis system (SAS) and other systems provide the automated procedures and techniques for analysis and management of environmental research data

  7. Handbook of Research on Environmental Taxation

    OpenAIRE

    2012-01-01

    The Handbook of Research on Environmental Taxation captures the state of the art of research on environmental taxation. Written by 36 specialists in environmental taxation from 16 countries, it takes an interdisciplinary and international approach, focusing on issues that are universal to using taxation to achieve environmental goals.The Handbook explores the conceptual foundations of environmental taxation, essential elements for designing environmental tax measures, factors that influence t...

  8. Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    Science.gov (United States)

    Sassaman, Len

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.

  9. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  10. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    Science.gov (United States)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  11. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  12. Summer Undergraduate Research Program: Environmental studies

    Energy Technology Data Exchange (ETDEWEB)

    McMillan, J. [ed.

    1994-12-31

    The purpose of the summer undergraduate internship program for research in environmental studies is to provide an opportunity for well-qualified students to undertake an original research project as an apprentice to an active research scientist in basic environmental research. The students are offered research topics at the Medical University in the scientific areas of pharmacology and toxicology, epidemiology and risk assessment, environmental microbiology, and marine sciences. Students are also afforded the opportunity to work with faculty at the University of Charleston, SC, on projects with an environmental theme. Ten well-qualified students from colleges and universities throughout the eastern United States were accepted into the program.

  13. BMFT. Subproject environmental research, ecological research. Annual report 1991

    International Nuclear Information System (INIS)

    1992-01-01

    This report summarizes the 1991 ecological research activities (ecosystems research, urban ecology, tropical ecology, forest decline, ecology of soils and waters, ecotoxicology, environmental pollution and health, protection of biotopes and protection of the species) which the project sponsors 'biology, energy, ecology' (Forschungszentrum Juelich) and 'environmental research and climatological research' (GSF-Forschungszentrum fuer Umwelt und Gesundheit) have been supervising on behalf of the Federal Ministry for Research and Technology to promote the subproject 'environmental research'. A general survey introduces the promoted projects, and standardized data sheets briefly introduce the individual activities. The appendix gives the project indices, the indices of joint projects, and a list of the supported companies and institutions. (BBR) [de

  14. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  15. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-05

    May 5, 2016 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  16. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 avr. 2014 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  17. Complicating food security: Definitions, discourses, commitments

    Directory of Open Access Journals (Sweden)

    William Ramp

    2014-12-01

    Full Text Available Food security is now commonly seen as one of the defining global issues of the century, intertwined with population and consumption shifts, climate change, environmental degradation, water scarcity, and the geopolitics attending globalization. Some analysts suggest that food security threats are so urgent that philosophical scruples must be set aside in order to concentrate all resources on developing and implementing radical strategies to avert a looming civilizational crisis. This article suggests that definitions of food security invoke commitments and have consequences, and that continued critical and conceptual attention to the language employed in food security research and policy is warranted.

  18. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  19. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  20. Environmental communication research in Finland; Ympaeristoeviestinnaen tutkimus Suomessa

    Energy Technology Data Exchange (ETDEWEB)

    Lyytimaeki, J.; Palosaari, M.

    2004-07-01

    This report presents Finnish research on environmental communication and describes different was of understanding the term environmental communication. The objective of the report is to indicate relevant topics for future research in environmental communication from the point of view of environmental policy research and Finnish environmental administration. The report outlines the development of environmental journalism from the 1960's till present and explores the different approaches taken in researching environmental communication. Or organisation and crisis communication, sociology, environmental education and policy are current y the fields of science most active in environmental communication research. Visuality of communication and the effects of new information technology are increasingly interesting phenomena for the study of environmental communication. This report points out needs of research from each of these fields. The report includes also a bibliography of environmental communication research in Finland. (orig.)

  1. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    Science.gov (United States)

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.

  2. Improving food security and nutrition through research | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... In Canada, the 2012 federal budget highlighted CIFSRF's success, noting how the ... New animal vaccines could keep more African farmers in business ... Research on food security makes a difference for African women.

  3. Environmental futures research at the U.S. Environmental Protection Agency

    Science.gov (United States)

    Robert L. Olson

    2012-01-01

    Relatively little research on environmental futures has been carried out in the United States. An exception is the long-running futures research that the U.S. Environmental Protection Agency (EPA) has been conducting since the 1970s. This paper reviews past and current efforts toward developing a capacity for environmental foresight within the EPA, and discusses some...

  4. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    Science.gov (United States)

    Wheater, H. S.

    2013-12-01

    The 336,000 km2 Saskatchewan River Basin (SaskRB) in Western Canada illustrates many of the issues of Water Security faced world-wide. It poses globally-important science challenges due to the diversity in its hydro-climate and ecological zones. With one of the world's more extreme climates, it embodies environments of global significance, including the Rocky Mountains (source of the major rivers in Western Canada), the Boreal Forest (representing 30% of Canada's land area) and the Prairies (home to 80% of Canada's agriculture). Management concerns include: provision of water resources to more than three million inhabitants, including indigenous communities; balancing competing needs for water between different uses, such as urban centres, industry, agriculture, hydropower and environmental flows; issues of water allocation between upstream and downstream users in the three prairie provinces; managing the risks of flood and droughts; and assessing water quality impacts of discharges from major cities and intensive agricultural production. Superimposed on these issues is the need to understand and manage uncertain water futures, including effects of economic growth and environmental change, in a highly fragmented water governance environment. Key science questions focus on understanding and predicting the effects of land and water management and environmental change on water quantity and quality. To address the science challenges, observational data are necessary across multiple scales. This requires focussed research at intensively monitored sites and small watersheds to improve process understanding and fine-scale models. To understand large-scale effects on river flows and quality, land-atmosphere feedbacks, and regional climate, integrated monitoring, modelling and analysis is needed at large basin scale. And to support water management, new tools are needed for operational management and scenario-based planning that can be implemented across multiple scales and

  5. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  6. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  7. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  8. Oceans and environmental security: Shared U.S. and Russian perspectives

    International Nuclear Information System (INIS)

    Broadus, J.M.; Vartanov, R.V.

    1994-01-01

    In 1989, the Institute for World Economy and International Relations of the Russian Academy of Sciences and the Marine Policy Center of Woods Hole Oceanographic Institution instituted a joint project to examine environmental security as it applies to the world's oceans. The book is a unified expression of their findings. The book focuses on seven specific concerns, land-based marine pollution, North Pacific fisheries depletion, hazardous materials transport, nuclear contamination, the Arctic Ocean, the Southern Ocean and Antarctica, and the Law of the Sea

  9. EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE

    Directory of Open Access Journals (Sweden)

    W. Xian

    2018-04-01

    Full Text Available According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  10. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  11. Integration of operational research and environmental management

    NARCIS (Netherlands)

    Bloemhof - Ruwaard, J.M.

    1996-01-01


    The subject of this thesis is the integration of Operational Research and Environmental Management. Both sciences play an important role in the research of environmental issues. Part I describes a framework for the interactions between Operational Research and Environmental Management.

  12. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  13. How 21st century droughts affect food and environmental security

    Science.gov (United States)

    Kogan, Felix

    The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.

  14. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  15. Food safety/food security aspects related to the environmental release of pharmaceuticals.

    Science.gov (United States)

    Brambilla, Gianfranco; Testa, Cecilia

    2014-11-01

    The environmental presence of pharmaceuticals in top soil and in water where extensive animal farming occurs may represent an involuntary source of residues in food that might affect both food safety and food security. We modelled the presence of residues in animal matrices from the inventoried environmental concentration of selected drugs in surface waters (range: 0.1-10μgL(-1)) and agriculture soils (range: 1-100μgkg(-1) dry weight), accounting for animal production parameters (i.e., forages, water intake and milk and egg production) and drug pharmacokinetics. The results indicate that the contamination of tetracyclines in top soil may represent a major issue both for the compliance with maximum residue levels in food (100-300ngg(-1)) and for the claim of organic products. via surface water, animals may be vulnerable to the intake of anabolics and growth-promoting agents, such as 17-beta estradiol and clenbuterol, only under a worst-case scenario. Their identification, which is currently achievable at a pgg(-1) level in animal specimens, is considered proof of illegal treatment and can lead to the prosecution of farmers. The Environmental Quality Standards that have been proposed for priority substances in surface waters may also be considered protective in terms of food security/food safety; however, a broad-spectrum characterisation of drugs within the agriculture context could be envisaged to refine the uncertainties in the risk assessment and for combined intakes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. An Environmental Ethical Conceptual Framework for Research on Sustainability and Environmental Education

    Science.gov (United States)

    Kronlid, David O.; Ohman, Johan

    2013-01-01

    This article suggests that environmental ethics can have great relevance for environmental ethical content analyses in environmental education and education for sustainable development research. It is based on a critique that existing educational research does not reflect the variety of environmental ethical theories. Accordingly, we suggest an…

  17. A Perspective on Research Challenges in Information Security

    Science.gov (United States)

    2011-11-01

    UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp

  18. Environmental pollution research in South America

    International Nuclear Information System (INIS)

    Miguel, A.H.

    1991-01-01

    This article provides and account of published research in environmental pollution carried out in South American institutions within the past 10 years. Because of the broadness of the topic, the continental dimensions of the assignment, and limitations of space and time, the article focuses on environmental research related to air, water, food, and soil. Thus, it is not a complete record, but rather a sample of published pollution research activities. The information here was obtained primarily from Dialog's electronic search of the Pollution Abstracts Database. The article also identifies other environmental problems that need the attention of South American researchers

  19. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  20. Research priorities in environmental education

    Science.gov (United States)

    George H. Moeller

    1977-01-01

    Although natural processes operate in urban areas, they are difficult to observe. Much discussion during the symposium-fair was devoted to finding ways to improve urban children's environmental understanding through environmental education programs. But before effective environmental education programs can be developed, research is needed to: test the...

  1. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  2. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  3. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  4. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  5. Environmental research - ecological research. Annual report 1996

    International Nuclear Information System (INIS)

    1997-01-01

    In the annual report 1996 of the Federal Ministry of Research and Technology, the points of emphasis of the ecological research programme and their financing are discussed. The individual projects in the following subject areas are described in detail: urban-industrial landscapes, forests, agricultural landscapes, river and lake landscapes, other ecosystems and landscapes, terrestrial ecosystem research, environmental pollution and human health and cross-sectional activities in ecological research. (vhe) [de

  6. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  7. Managing security and privacy concerns over data storage in healthcare research.

    Science.gov (United States)

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  8. “The Thinking Eye” and “The Open Sky:” Developing a Framework of an Environmental View of Security

    Directory of Open Access Journals (Sweden)

    Dr. Helen MARGARITOU-ANDRIANESSI

    2016-07-01

    Full Text Available Discussion of security integration began with discussion of the threatened local time-frame of our existence and preferred forms of behavior. We examine strategic requirements and stances toward environmental security, because the “gestalt thinking and ontology” and the “reflective cast of mind” influence our experience of security procedures in order to evaluate successful modes of interventions in ecosystem, changes in politics and security exchanges. The goal is a multi-criterion optimization problem which we suggest to bring to a single criterion one: to embrace more gestalt relations in order to reproduce the basic elements of the concept of security and common strategies.

  9. Nevada National Security Site Environmental Report 2010, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    Introduction to the Nevada National Security Site Environmental Report 2010. Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  10. Environmental Education Research: To What Ends?

    Science.gov (United States)

    Jickling, Bob

    2009-01-01

    This paper engages questions about ends in environmental education research. In doing so, I argue that such questions are essentially normative, and that normative questions are underrepresented in this field. After cautioning about perils of prescribing research agendas, I gently suggest that in environmental education key normative questions…

  11. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  12. Science implementation of Forecast Mekong for food and environmental security

    Science.gov (United States)

    Turnipseed, D. Phil

    2012-01-01

    Forecast Mekong is a significant international thrust under the Delta Research and Global Observation Network (DRAGON) of the U.S. Geological Survey (USGS) and was launched in 2009 by the U.S. Department of State and the Foreign Ministers of Cambodia, Laos, Thailand, and Vietnam under U.S. Department of State Secretary Hillary R. Clinton's Lower Mekong Initiative to enhance U.S. engagement with countries of the Lower Mekong River Basin in the areas of environment, health, education, and infrastructure. Since 2009, the USGS has worked closely with the U.S. Department of State; personnel from Cambodia, Laos, Thailand, and Vietnam; nongovernmental organizations; and academia to collect and use research and data from the Lower Mekong River Basin to provide hands-on results that will help decisionmakers in future planning and design for restoration, conservation, and management efforts in the Lower Mekong River Basin. In 2012 Forecast Mekong is highlighting the increasing cooperation between the United States and Lower Mekong River Basin countries in the areas of food and environmental security. Under the DRAGON, Forecast Mekong continues work in interactive data integration, modeling, and visualization system by initiating three-dimensional bathymetry and river flow data along with a pilot study of fish distribution, population, and migratory patterns in the Lower Mekong River Basin. When fully developed by the USGS, in partnership with local governments and universities throughout the Mekong River region, Forecast Mekong will provide valuable planning tools to visualize the consequences of climate change and river management.

  13. Environmental and climate research programme 1988/89

    International Nuclear Information System (INIS)

    1987-01-01

    The Study Group of the Large-scale Research Institutes (AGF) has been reporting on these projects since 1972, in its programme for 'Environmental and Climate Research'. The programme, which is worked out by the AGF's Coordination Office for Environmental Research, is closely connected with the programmes of the Federal Government; it is revised and updated periodically by the AGF's Coordination Committees for 'Environmental Research' and 'Climate Research'. The 1988/89 programme gives an up-to-date overview of research projects in the field of 'Research and Technology for Health, Nutrition and the Environment' financed with the AGF programme budget of 1988. At the same time, however, it also documents projects of other areas of the programme concerned with environmental issues. Development trends are also discernible in the specification of the goals for 1989. The figures mentioned in the present programme are not comparable with those of earlier programmes, owing to inclusion of the programme section concerned with issues of climate, and to structural changes. (orig./KW) [de

  14. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  15. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  16. Management of Ecological and Economic Security of Industrial Enterprises

    Directory of Open Access Journals (Sweden)

    Ivantsova Elena Anatolyevna

    2014-11-01

    Full Text Available The purpose of this study was the modeling of ecological and economic security of production processes in an industrial plant using methods of fuzzy logic. The subject of the research – methods of modeling systems of ecological and economic security of industrial enterprises, based on the adaptation of fuzzy set theory to solve this problem. In the research process the following scientific methods and techniques were applied: scientific abstraction, analysis, synthesis, methods of grouping, comparison, etc. Along with the traditional methods the authors used the tools for simulation modeling, fuzzy sets systems, computer simulation MatLab. The informational and empirical basis of the research was formed on the basis of the data of the Federal service of state statistics and its territorial subdivisions of the Ministry of economic development of the Russian Federation, e-resources of the Internet, the research by Russian and foreign scientists, experts’ assesments. The article presents the author’s method of ensuring ecological and economic security in the enterprise by means of fuzzy logic, based on the quantitative assessment of indicators of threats in MatLab and results of visualization of fuzzy-multiple modeling of ecological and economic security. The algorithm of calculation of the conditional environmental pressures on water resources and the atmosphere, allowed to determine the dependence between the cost of wastewater treatment and economic damage from pollution and to evaluate the effectiveness of various conservation programs, and to analyze their impact on environmental sustainability. The authors also develop complex fuzzy models and implemented their software in the MatLab Fuzzy Logic Toolbox, which allowed to obtain an integrated assessment of the state of the enterprise environmental safety and comparisons of the values of these threats based on assessment. The author presents the author’s methodology and the evaluation

  17. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Han Seong

    2016-01-01

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  18. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of)

    2016-10-15

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  19. Environmental radiation monitoring around the research reactors

    International Nuclear Information System (INIS)

    Lee, Chang Woo; Lee, Hyun Duk; Kim, Sam Rang; Choi, Yong Ho; Kim, Jeong Moo; Lee, Myeon Joo; Lee, Myeong Ho; Hong, Kwang Hee; Lim, Moon Ho; Lee, Won Yoon; Park, Do Won; Choi, Sang Do

    1993-04-01

    Environmental radiation monitoring was carried out measurement of environmental radiation and environmental radioactivity analysis around KAERI nuclear facilities and Seoul research reactor. The results of environmental radiation monitoring around KAERI nuclear facilities and Seoul research reactor are the follows : The average level of environmental radiation dose measured by NaI scintillation counter and accumulated radiation dose by TLD was almost same level compared with the past years. Gross α, β radioactivity in environmental sample was not found abnormal data. γ-radionuclides in water samples were not detected. But only radionuclide K-40, which is natural radionuclide, was detected in the all samples and Cs-137 was detected in the surface soil and discharge sediment. The average level of environmental radiation dose around Seoul research reactor was almost same level compared with the past years, and Be-7 and Cs-137 were detected in some surface soil and discharge sediment by γ-spectrometry. (Author)

  20. Environmental support, energy security and economic growth in Japan

    International Nuclear Information System (INIS)

    Gasparatos, Alexandros; Gadda, Tatiana

    2009-01-01

    This study investigates the resource consumption of Japanese society since 1979 and its subsequent effects on the economic output of the nation and the environment. In order to quantify resource appropriation and trends in production and consumption, the concept of emergy synthesis is employed. Our results show a significant increase in the total amount of emergy consumed by 66.9% between 1979 and 2003 which comes hand in hand with an increase in the level of environmental stress by 93.7% (quantified as the environmental loading ratio). On the other hand the emergy required to produce 1 USD of economic output has been gradually decreasing which denotes an increase in the efficiency of the conversion of natural capital into economic output. What is most interesting though is the growing dependence of the Japanese economy on imported emergy, increasingly from developing nations, that severely affects the potential for unhindered economic growth. This can prove to be a big barrier that could affect the resource security of the Japanese economy and render it susceptible to risks associated with access to natural resources which in turn can jeopardise its long-term economic sustainability.

  1. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  2. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  3. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  4. New Swedish environmental and sustainable education research

    Directory of Open Access Journals (Sweden)

    Johan Öhman

    2011-01-01

    Full Text Available This special issue of Education & Democracy presents examples froma new generation of Swedish research on environmental and sustainability education and thereby complement the picture of the current Swedish environmental and sustainability education research outlined in the recent Danish-Swedish special issue of Environmental EducationResearch (Vol 16, No 1 and the anthology Democracy and Values inEducation for Sustainable Development – Contributions from Swedish Research (Öhman 2008. All the contributors to this issue are associatedwith the Graduate School in Education and Sustainable Development (GRESD, either as PhD students or as supervisors.

  5. Environmental Systems Research FY-99 annual report

    International Nuclear Information System (INIS)

    Miller, D.L.

    2000-01-01

    The Environmental Systems Research (ESR) Program, a part of the Environmental Systems Research and Analysis (ESRA) Program, was implemented to enhance and augment the technical capabilities of the Idaho National Engineering and Environmental Laboratory (INEEL). The purpose for strengthening technical capabilities of the INEEL is to provide the technical base to serve effectively as the Environmental Management Laboratory for the Department of Energy's Office of Environmental Management (EM). The original portfolio of research activities was assembled after an analysis of the EM technology development and science needs as gathered by the Site Technology Coordination Groups (STCGs) complex-wide. Current EM investments in science and technology throughout the research community were also included in this analysis to avoid duplication of efforts. This is a progress report for the second year of the ESR Program (Fiscal Year 99). A report of activities is presented for the five ESR research investment areas: (a) Transport Aspects of Selective Mass Transport Agents, (b) Chemistry of Environmental Surfaces, (c) Materials Dynamics, (d) Characterization Science, and (e) Computational Simulation of Mechanical and Chemical Systems. In addition to the five technical areas, activities in the Science and Technology Foundations element of the program, e.g., interfaces between ESR and the EM Science Program (EMSP) and the EM Focus Areas, are described

  6. Environmental Systems Research, FY-99 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, David Lynn

    2000-01-01

    The Environmental Systems Research (ESR) Program, a part of the Environmental Systems Research and Analysis (ESRA) Program, was implemented to enhance and augment the technical capabilities of the Idaho National Engineering and Environmental Laboratory (INEEL). The purpose for strengthening technical capabilities of the INEEL is to provide the technical base to serve effectively as the Environmental Management Laboratory for the Department of Energy's Office of Environmental Management (EM). The original portfolio of research activities was assembled after an analysis of the EM technology development and science needs as gathered by the Site Technology Coordination Groups (STCGs) complex-wide. Current EM investments in science and technology throughout the research community were also included in this analysis to avoid duplication of efforts. This is a progress report for the second year of the ESR Program (Fiscal Year 99). A report of activities is presented for the five ESR research investment areas: (a) Transport Aspects of Selective Mass Transport Agents, (b) Chemistry of Environmental Surfaces, (c) Materials Dynamics, (d) Characterization Science, and (e) Computational Simulation of Mechanical and Chemical Systems. In addition to the five technical areas, activities in the Science and Technology Foundations element of the program, e.g., interfaces between ESR and the EM Science Program (EMSP) and the EM Focus Areas, are described.

  7. Environmental Systems Research FY-99 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, D.L.

    2000-01-01

    The Environmental Systems Research (ESR) Program, a part of the Environmental Systems Research and Analysis (ESRA) Program, was implemented to enhance and augment the technical capabilities of the Idaho National Engineering and Environmental Laboratory (INEEL). The purpose for strengthening technical capabilities of the INEEL is to provide the technical base to serve effectively as the Environmental Management Laboratory for the Department of Energy's Office of Environmental Management (EM). The original portfolio of research activities was assembled after an analysis of the EM technology development and science needs as gathered by the Site Technology Coordination Groups (STCGs) complex-wide. Current EM investments in science and technology throughout the research community were also included in this analysis to avoid duplication of efforts. This is a progress report for the second year of the ESR Program (Fiscal Year 99). A report of activities is presented for the five ESR research investment areas: (a) Transport Aspects of Selective Mass Transport Agents, (b) Chemistry of Environmental Surfaces, (c) Materials Dynamics, (d) Characterization Science, and (e) Computational Simulation of Mechanical and Chemical Systems. In addition to the five technical areas, activities in the Science and Technology Foundations element of the program, e.g., interfaces between ESR and the EM Science Program (EMSP) and the EM Focus Areas, are described.

  8. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  9. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  10. Overview of Gas Research Institute environmental research programs

    International Nuclear Information System (INIS)

    Evans, J.M.

    1991-01-01

    The Gas Research Institute (GRI) is a private not-for-profit membership organization of natural gas pipelines, distribution companies and natural gas producers. GRI's purpose is to plan, to manage and to develop financing for a gas-related research and development (R and D) program on behalf of its members and their customers. GRI does not do any research itself. GRI's R and D program is designed to provide advanced technologies for natural gas supply, transport, storage, distribution and end-use applications in all markets. In addition, basic research is conducted for GRI in these areas to build a foundation for future technology breakthroughs. Work in the Environment and Safety Research Department includes sections interested in: supply related research, air quality research, end use equipment safety research, gas operations safety research, and gas operations environmental research. The Natural Gas Supply Program has research ongoing in such areas as: restoration of pipeline right-of-ways; cleaning up town gas manufacturing sites; the development of methanogenic bacteria for soil and groundwater cleanup; development of biological fluidized carbon units for rapid destruction of carbonaceous compounds; research on liquid redox sulfur recovery for sulfur removal from natural gas; research on produced water and production wastes generated by the natural gas industry; environmental effects of coalbed methane production; and subsurface effects of natural gas operations. The western coalbed methane and ground water programs are described

  11. Environmental degradation, population displacement and global security: An overview of the issues

    International Nuclear Information System (INIS)

    1992-12-01

    An initial investigation is presented on the interrelationship between environmental degradation and population displacements, in the broader context of how this linkage affects human security. Emphasis is placed on both the causes and effects of population movements, with specific examples drawn from Southeast Asia. Types of migrants, the importance of environmental degradation with respect to other contributing factors, and the effects on origin and destination regions are considered. A key issue is the multi-causality of population displacements and the importance of improving understanding of the issues in order to develop appropriate policies. It is clear from the study that the discussion of environment as a cause or contributing factor to population displacement has, to date, been speculative, and the information provided largely anecdotal. 58 refs., 1 fig., 3 tabs

  12. Environmental Biotechnology Research and Development Program 1989-1992

    OpenAIRE

    Brinkman J; Rulkens WH; Visscher K

    1989-01-01

    This report is an English translation of the Dutch Research and Development Program on environmental biotechnology 1989-1992. In this program an overview is given of the recent developments in environmental biotechnology. Based on this overview, the possibilities of biotechnology for management of the environment are evaluated. In this program two kinds of research are distinguished. Applied research directly focusses on specific environmental problems. Fundamental research aims at developing...

  13. Tourism and environmental research: a review

    Energy Technology Data Exchange (ETDEWEB)

    Pearce, D G

    1985-01-01

    This paper reviews the nature and scope of research into the environmental impact of tourism, the role such research may play in tourist development and conservation and the constraints which may be encountered. Research in this field is characterized by a wide spectrum of generally complex interrelationships and impacts. In recent years there has been a growing call from policy-makers for environmental guidelines, indicators and other research but as yet a few immediate solutions to their problems and answers to their request are to hand. The complexity of the issues involved and other difficulties have also limited the extent to which research has been fed into the decision-making process.

  14. Animals in Environmental Education Research

    Science.gov (United States)

    Spannring, Reingard

    2017-01-01

    Over the past few decades, the increase in public and scholarly attention to human-animal relations has inspired an animal turn in a number of academic disciplines including environmental education research. This paper reviews the literature on animals in environmental education with respect to its theoretical foundations in critical pedagogy,…

  15. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  16. Environmental research on actinide elements

    International Nuclear Information System (INIS)

    Pinder, J.E. III; Alberts, J.J.; McLeod, K.W.; Schreckhise, R.G.

    1987-08-01

    The papers synthesize the results of research sponsored by DOE's Office of Health and Environmental Research on the behavior of transuranic and actinide elements in the environment. Separate abstracts have been prepared for the 21 individual papers

  17. Isotopes in environmental research

    International Nuclear Information System (INIS)

    Bowen, G.; Rozanski, K.; Vose, P.

    1990-01-01

    Radioactive and stable isotopes have long been considered a very efficient tool for studying physical and biological aspects of how the global ecosystem functions. Their applications in environmental research are numerous, embracing research at all levels. This article looks at only a few of the approaches to environmental problems that involve the use of isotopes. Special attention is given to studies of the Amazon Basin. Environmental isotopes are very efficient tools in water cycle studies. Tritium, a radioactive tracer, is especially useful in studying dynamics of water movement in different compartments of the hydrosphere, both on the local and global scales. Heavy stable isotopes of hydrogen and oxygen (deuterium and oxygen-18) provide information about steady-state characteristics of the water cycle. Isotope methods, some relatively new, have a major role in site-specific studies. Some indicative examples include: Studying turnover of organic matter. Changes in the carbon-13/carbon-12 isotopic ratio of organic matter were used to determine the respective contributions of organic carbon derived from forest and pasture. Studying biological nitrogen fixation. One of the ways nitrogen levels in soil can be maintained for productivity is by biological nitrogen fixation. Studying nitrogen availability and losses. The experimental use of nitrogen-15 is invaluable for defining losses of soil nitrogen to the atmosphere and to groundwater. Studies can similarly be done with stable and radioactive sulphur isotopes. This article indicates some potential uses of isotopes in environmental research. While the major problem of global climate change has not been specifically addressed here, the clearing of the Amazon forest, one focus of the IAEA's environmental programme, may have serious consequences for the global climate. These include substantial reduction of the amount of latent heat transported to the regions outside the tropics and acceleration of the greenhouse

  18. Security approaches in using tablet computers for primary data collection in clinical research.

    Science.gov (United States)

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  19. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  20. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  1. Еcological security of environment in Zhytomyr region

    Directory of Open Access Journals (Sweden)

    I.М. Kovalevska

    2016-03-01

    Full Text Available The article is aiming at the study of environmental hazards in Zhytomir region. Its main objective is to identify the set of adverse factors affecting the state of danger and compose a necessary starting material for the prediction of possible negative consequences, their nature and extent. The matter of special importance for the study of the phenomenon of security is the security classification. First of all, the forms (system of security in relation to the forces and processes of natural, social and technical character should be distinguished. They can be defined as systems of geo-bio-physical, social and technical security. The classification of security can be determined in many ways, for example, in relation to the object of security; in relation to the subject of security; according to the problem indication; according to the functional indication. Security is a distinctive characteristic and prerequisite of life, progressive development and viability of real-world objects. The methodology of its evaluation is based on the states of the essence of natural and anthropogenic environmental pollution, the standard requirements for the quality of environmental objects and standards of acceptable contamination. The assessment of ecological security of the environment is the quantitative measure of parameters of environmental pollution dangers, threats and risks of natural character as well as the state of anthropogenic security. This assessment is carried out according to the methods and ways to measure environmental parameters. For this purpose it is important to know the factors of danger and the system of indicators that characterizes all natural and environmental phenomena and processes of geo-ecological dangers, natural environmental conditions, ecological condition. The system of natural and industrial environmental indicators consists of the indicators which characterize all phenomena and processes of geo-ecological dangers of natural

  2. Research report 1987-1989: Environmental Quality Laboratory and Environmental Engineering Science, W. M. Keck Laboratories

    OpenAIRE

    Brooks, Norman H.

    1990-01-01

    This research biennial report for 1987-89 covers the activities of both the Environmental Engineering Science program and the Environmental Quality Laboratory for the period October 1987-November 1989. Environmental Engineering Science is the degree-granting academic program housed in the Keck Laboratories, with associated research projects. The Environmental Quality Laboratory is a research center focusing on large scale problems of environmental quality and natural resources. All the facult...

  3. Proceedings of Regional Asia Pacific Defence Environmental Workshop Held in Darwin, Australia on 11-14 May 1998 (Environmental Security Series Number 5)

    Science.gov (United States)

    1998-05-01

    actions being undertaken to combat these issues, and the mutual benefits obtained through the partnership arrangement. The Conference was also attended...1993 (Oxford: Oxford University Press) Butts, Kent Hughes (1994) Environmental security: a partnership for peace. Strategic Studies Institute...GOVERNMENTAL ORGANISATIONS (NGOs) Mr. Michael Rae Program Leader-Resource Conservation World Wide Fund For Nature-Australia ( WWF -Australia

  4. Can postpositivist research in environmental education engender ...

    African Journals Online (AJOL)

    In this article we contend that postpositivist research in environmental education can contribute towards promoting ethical activity within higher education. We argue that postpositivist inquiry breaks with utilitarian and uncritical assumptions about research in environmental education and also creates unconfined spaces for ...

  5. Environmental Justice Research: Contemporary Issues and Emerging Topics.

    Science.gov (United States)

    Chakraborty, Jayajit; Collins, Timothy W; Grineski, Sara E

    2016-11-01

    Environmental justice (EJ) research seeks to document and redress the disproportionate environmental burdens and benefits associated with social inequalities. Although its initial focus was on disparities in exposure to anthropogenic pollution, the scope of EJ research has expanded. In the context of intensifying social inequalities and environmental problems, there is a need to further strengthen the EJ research framework and diversify its application. This Special Issue of the International Journal of Environmental Research and Public Health (IJERPH) incorporates 19 articles that broaden EJ research by considering emerging topics such as energy, food, drinking water, flooding, sustainability, and gender dynamics, including issues in Canada, the UK, and Eastern Europe. Additionally, the articles contribute to three research themes: (1) documenting connections between unjust environmental exposures and health impacts by examining unsafe infrastructure, substance use, and children's obesity and academic performance; (2) promoting and achieving EJ by implementing interventions to improve environmental knowledge and health, identifying avenues for sustainable community change, and incorporating EJ metrics in government programs; and (3) clarifying stakeholder perceptions of EJ issues to extend research beyond the documentation of unjust conditions and processes. Collectively, the articles highlight potentially compounding injustices and an array of approaches being employed to achieve EJ.

  6. Environmental Justice Research: Contemporary Issues and Emerging Topics

    Directory of Open Access Journals (Sweden)

    Jayajit Chakraborty

    2016-11-01

    Full Text Available Environmental justice (EJ research seeks to document and redress the disproportionate environmental burdens and benefits associated with social inequalities. Although its initial focus was on disparities in exposure to anthropogenic pollution, the scope of EJ research has expanded. In the context of intensifying social inequalities and environmental problems, there is a need to further strengthen the EJ research framework and diversify its application. This Special Issue of the International Journal of Environmental Research and Public Health (IJERPH incorporates 19 articles that broaden EJ research by considering emerging topics such as energy, food, drinking water, flooding, sustainability, and gender dynamics, including issues in Canada, the UK, and Eastern Europe. Additionally, the articles contribute to three research themes: (1 documenting connections between unjust environmental exposures and health impacts by examining unsafe infrastructure, substance use, and children’s obesity and academic performance; (2 promoting and achieving EJ by implementing interventions to improve environmental knowledge and health, identifying avenues for sustainable community change, and incorporating EJ metrics in government programs; and (3 clarifying stakeholder perceptions of EJ issues to extend research beyond the documentation of unjust conditions and processes. Collectively, the articles highlight potentially compounding injustices and an array of approaches being employed to achieve EJ.

  7. Environmental Systems Research Candidates FY-01 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, David Lynn; Piet, Steven James

    2001-03-01

    The Environmental Systems Research Candidates (ESRC) Program ran from April 2000 through September 2001 as part of the Environmental Systems Research and Analysis (ESRA) Program at the Idaho National Engineering and Environmental Laboratory (INEEL). ESRA provides key science and technology to meet the cleanup mission of the U.S. Department of Energy Office of Environmental Management (EM), and performs research and development that will help solve current legacy problems and enhance the INEEL’s scientific and technical capability for solving longer-term challenges. This report documents the accomplishments of the ESRC Program. The ESRC Program consisted of 25 tasks subdivided within four research areas.

  8. Environmental trends and issues at the research horizon

    International Nuclear Information System (INIS)

    Schwartz, J.H.; Warshaw, C.J.; Stoner, B.; Coerr, S.; O'Neal, J.

    1992-01-01

    This report provides a forecast of environmental trends and issues likely to emerge in the next 5 to 15 years. The report identifies and describes eleven significant emerging tends (i.e., general shifts in environmental policy-making, technology, regulation and public opinion) and - specific environmental issues (i.e., real or perceived environmental problems). The report further describes various debates or key questions that will determine over the next 5 to 15 years the potential government response to these environmental issues. This information is intended to assist the Gas research Institute as a research organization in planning and initiating research projects that will be relevant to important debates in the future

  9. Environmental research on actinide elements

    Energy Technology Data Exchange (ETDEWEB)

    Pinder, J.E. III; Alberts, J.J.; McLeod, K.W.; Schreckhise, R.G. (eds.)

    1987-08-01

    The papers synthesize the results of research sponsored by DOE's Office of Health and Environmental Research on the behavior of transuranic and actinide elements in the environment. Separate abstracts have been prepared for the 21 individual papers. (ACR)

  10. Environmental research program. 1992 annual report

    Energy Technology Data Exchange (ETDEWEB)

    1993-07-01

    The objective of the Environmental Research Program is to contribute to the understanding of the formation, mitigation, transport, transformation, and ecological effects of energy-related pollutants on the environment. The program is multidisciplinary and includes fundamental and applied research in chemistry, physics, biology, engineering, and ecology. The program undertakes research and development in efficient and environmentally benign combustion, pollution abatement and destruction, and novel methods of detection and analysis of criteria and non-criteria pollutants. This diverse group investigates combustion, atmospheric processes, flue-gas chemistry, and ecological systems.

  11. 75 FR 6651 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2010-02-10

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Department... meeting of the Biological and Environmental Research Advisory Committee (BERAC). Federal Advisory.... Department of Energy, Office of Science, Office of Biological and Environmental Research, SC-23/Germantown...

  12. Practice-Based Interdisciplinary Approach and Environmental Research

    Directory of Open Access Journals (Sweden)

    Ranjan Kumar Datta

    2017-03-01

    Full Text Available Interdisciplinary researchers and educators, as community members, creators of knowledge, and environmental activists and practitioners, have a responsibility to build a bridge between community practice, academic scholarship, and professional contributions aimed at establishing environmental sustainability. In this paper, I focus on an undervalued area of environmental politics, practices, and often unarticulated assumptions which underlie human–environmental relations. This article challenges interdisciplinary studies that are not connected with practice by reconfiguring the meaning of a community-based, interdisciplinary approach. Drawing from works by Foucault, Latour, and Haraway, this paper first shows how to reconfigure the meaning of an interdisciplinary approach. Second, using Bourdieu and Brightman’s ethnographic studies as a framework, the paper situates practice as central to our efforts to deconstruct and replace current interdisciplinary initiatives with a practice-based approach. Through a practice-based interdisciplinary approach (PIA, environmental educators and researchers gain an awareness of and learn to make an investment in sustainable communities. As teams of environmental researchers practising in the local community, they are meaningfully involved with the community, with each other, and with the environment.

  13. Translational Environmental Research: Improving the Usefulness and Usability of Research Results

    Science.gov (United States)

    Garfin, G.

    2008-12-01

    In recent years, requests for proposals more frequently emphasize outreach to stakeholder communities, decision support, and science that serves societal needs. Reports from the National Academy of Sciences and Western States Water Council emphasize the need for science translation and outreach, in order to address societal concerns with climate extremes, such as drought, the use of climate predictions, and the growing challenges of climate change. In the 1990s, the NOAA Climate Program Office developed its Regional Integrated Sciences and Asssessments program to help bridge the gap between climate science (notably, seasonal predictions) and society, to improve the flow of information to stakeholders, and to increase the relevance of climate science to inform decisions. During the same time period, the National Science Foundation initiated multi-year Science and Technology Centers and Decision Making Under Uncertainty Centers, with similar goals, but different metrics of success. Moreover, the combination of population growth, climate change, and environmental degradation has prompted numerous research initiatives on linking knowledge and action for sustainable development. This presentation reviews various models and methodologies for translating science results from field, lab, or modeling work to use by society. Lessons and approaches from cooperative extension, boundary organizations, co-production of science and policy, and medical translational research are examined. In particular, multi-step translation as practiced within the health care community is examined. For example, so- called "T1" (translation 1) research moves insights from basic science to clinical research; T2 research evaluates the effectiveness of clinical practice, who benefits from promising care regimens, and develops tools for clinicians, patients, and policy makers. T3 activities test the implementation, delivery, and spread of research results and clinical practices in order to foster

  14. 77 FR 4028 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2012-01-26

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Department... meeting of the Biological and Environmental Research Advisory Committee (BERAC). The Federal Advisory.... Department of Energy, Office of Science, Office of Biological and Environmental Research, SC-23/Germantown...

  15. Environmental research perspectives in South Africa

    CSIR Research Space (South Africa)

    Ecosystem Programmes

    1982-12-01

    Full Text Available The National Programme for Environmental Sciences is a cooperative undertaking of scientists and scientific institutions in South Africa concerned with research related to environmental problems. This annual report describes the rationale, approach...

  16. Managing nutrient for both food security and environmental sustainability in China: an experiment for the world

    Directory of Open Access Journals (Sweden)

    Fusuo ZHANG, Zhenling CUI, Weifeng ZHANG

    2014-02-01

    Full Text Available The challenges of how to simultaneously ensure global food security, improve nitrogen use efficiency (NUE and protect the environment have received increasing attention. However, the dominant agricultural paradigm still considers high yield and reducing environmental impacts to be in conflict with one another. Here we examine a Three-Step-Strategy of past 20 years to produce more with less in China, showing that tremendous progress has been made to reduce N fertilizer input without sacrificing crop yield. The first step is to use technology for in-season root-zone nutrient management to significantly increase NUE. The second is to use technology for integrated nutrient management to increase both yield and NUE by 15%—20%. The third step is to use technology for integrated soil-crop system management to increase yield and NUE by 30%—50% simultaneously. These advances can thus be considered an effective agricultural paradigm to ensure food security, while increasing NUE and improving environmental quality.

  17. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  18. Environmental-performance research priorities: Wood products. Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-01-15

    This report describes a research plan to establish environmental, energy, and economic performance measures for renewable building materials, and to identify management and technology alternatives to improve environmental performance in a cost-effective manner. The research plan is designed to: (1) collect environmental and economic data on all life-cycle stages of the materials, (2) ensure that the data follows consistent definitions and collection procedures, and (3) develop analytical procedures for life-cycle analysis to address environmental performance questions. The research will be subdivided into a number of individual project modules. The five processing stages of wood used to organize the research plan are: (1) resource management and harvesting; (2) processing; (3) design and construction of structures; (4) use, maintenance, and disposal; and (5) waste recycling. Individual research module descriptions are provided in the report, as well as assessment techniques, research standards and protocol, and research management. 13 refs., 5 figs., 3 tabs.

  19. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  20. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  1. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  2. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  3. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  4. EDITORIAL: The need and challenge for Environmental Research Letters

    Science.gov (United States)

    Kammen, Daniel M.

    2006-11-01

    will make it a truly unique resource for scholars in developed and developing nations, as well as for environmental non-governmental groups, public servants, businesses and industry groups, and anyone who would not normally find their way, or have the financial means, to access an academic journal. Our goal to remain open-access will require that ERL secure a commitment of financial support—ideally from a foundation, individual, or a national or international research agency—so that the journal can publish in this fashion without the support of significant article publication charges. In this area we call on you to consider supporting, or to direct our editorial staff to groups who want to support, this venture. Exceptionally fast publication. As it gears up for regular publication, ERL is committed to a 90 day turn-around from article submission through to online publication for accepted Letters. Outstandingly high article visibility. ERL's open-access publishing model will guarantee its authors high article visibility, capturing a wide audience that includes both specialists and the wider community. The journal will serve its broad readership by publishing Perspectives that put disciplinary papers in a wider context, and explore the intellectual and policy impacts of broader, cross-disciplinary papers. A significant fraction of the research articles published in ERL will appear with 500 1000 word commentary pieces—solicited from not only leading scholars, but also leading political, business, legal, and community leaders—that extend and expand the dialog of the papers. Several articles published in the inaugural issue of the journal will be accompanied by such Perspectives. ERL will also link academic to professional development. In addition to primary research, the journal and its forthcoming accompanying community website will include: Special issues, focusing on fast-changing environmental issues. For 2007, we already have issues planned on 'Environmental

  5. Notification: Audit of the U.S. Environmental Protection Agency’s Compliance with the Federal Information Security Management Act

    Science.gov (United States)

    Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).

  6. Strategic Environmental Research and Development Program, Fiscal Year 2007

    Science.gov (United States)

    2008-02-01

    is a non- voting member of the SERDP Council and a voting member of the EWG. Dr. Jeffrey Marqusee, the Environmental Security Technology... Tensor Gradiometer Receiver (MM- 1534), G&G Sciences SERDP 26 • Handheld Frequency Domain Vector EMI Sensing for UXO Discrimination (MM-1537...Sep-07 ● TOTALS $12,446 $6,409 $208 (1) Congressional Earmark. (2) Project update to Board; no vote on funding required. Figure III-2

  7. The Scottish Government's Rural and Environmental Science and Analytical Services Strategic Research Progamme

    Science.gov (United States)

    Dawson, Lorna; Bestwick, Charles

    2013-04-01

    The Strategic Research Programme focuses on the delivery of outputs and outcomes within the major policy agenda areas of climate change, land use and food security, and to impact on the 'Wealthier', 'Healthier' and 'Greener' strategic objectives of the Scottish Government. The research is delivered through two programmes: 'Environmental Change' and 'Food, Land and People'; the core strength of which is the collaboration between the Scottish Government's Main Research Providers-The James Hutton Institute, the Moredun Research Institute, Rowett Institute of Nutrition and Health University of Aberdeen, Scotland's Rural College, Biomathematics and Statistics Scotland and The Royal Botanic Gardens Edinburgh. The research actively seeks to inform and be informed by stakeholders from policy, farming, land use, water and energy supply, food production and manufacturing, non-governmental organisations, voluntary organisations, community groups and general public. This presentation will provide an overview of the programme's interdisciplinary research, through examples from across the programme's themes. Examples will exemplify impact within the Strategic Programme's priorities of supporting policy and practice, contributing to economic growth and innovation, enhancing collaborative and multidisciplinary research, growing scientific resilience and delivering scientific excellence. http://www.scotland.gov.uk/Topics/Research/About/EBAR/StrategicResearch/future-research-strategy/Themes/ http://www.knowledgescotland.org/news.php?article_id=295

  8. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  9. Environmental Research Program. 1994 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Brown, N.J.

    1995-04-01

    The objective of the Environmental Research Program is to enhance the understanding of, and mitigate the effects of pollutants on health, ecological systems, global and regional climate, and air quality. The program is multi-disciplinary and includes fundamental research and development in efficient and environmentally-benign combustion, pollutant abatement and destruction, and novel methods of detection and analysis of criteria and non-criteria pollutants. This diverse group conducts investigations in combustion, atmospheric and marine processes, flue-gas chemistry, and ecological systems.

  10. Environmental education policy research

    DEFF Research Database (Denmark)

    Læssøe, Jeppe; Feinstein, Noah Weeth; Blum, Nicole

    2013-01-01

    in the areas of Environmental Education (EE), Education for Sustainable Development and Climate Change Education. It especially makes a case for two kinds of research on EE policy: (1) a multi-sited approach to empirical documentation and theory development which explores the relationships between...

  11. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  12. Research on image reconstruction of DR/SSCT security inspection system

    International Nuclear Information System (INIS)

    Li Jian; Cong Peng

    2008-01-01

    On the basis of DR (Digital Radiography)/CT security inspection system, DR/SSCT (single slice spiral CT) security inspection system was developed. This spiral CT system can improve the CT system's drawbacks. The research work includes in replacing the former data acquisition system by a new system which can acquire projection data of multi-slices and devising the SSCT reconstruction algorithms. Simulation experiments and practical experiments were devised to contrast several algorithms. Interpolation technique was operated in detectors data in order to improve the algorithms. In conclusion, the system exploits an algorithm of weighted average of 360 degree LI (Linear Interpolation) and JH-HI (Jiang Hsieh-Half scan Interpolation). (authors)

  13. What current literature tells us about sustainable diets: emerging research linking dietary patterns, environmental sustainability, and economics.

    Science.gov (United States)

    Auestad, Nancy; Fulgoni, Victor L

    2015-01-01

    The concept of sustainable diets, although not new, is gaining increased attention across the globe, especially in relation to projected population growth and growing concerns about climate change. As defined by the FAO (Proceedings of the International Scientific Symposium, Biodiversity and Sustainable Diets 2010; FAO 2012), "Sustainable diets are those diets with low environmental impacts which contribute to food and nutrition security and to healthy life for present and future generations." Consistent and credible science that brings together agriculture, food systems, nutrition, public health, environment, economics, culture, and trade is needed to identify synergies and trade-offs and to inform guidance on vital elements of healthy, sustainable diets. The aim of this article is to review the emerging research on environmental and related economic impacts of dietary patterns, including habitual eating patterns, nutritionally balanced diets, and a variety of different dietary scenarios. Approaches to research designs, methodologies, and data sources are compared and contrasted to identify research gaps and future research needs. To date, it is difficult to assimilate all of the disparate approaches, and more concerted efforts for multidisciplinary studies are needed. © 2015 American Society for Nutrition.

  14. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  15. Perspective on energy security and other non environmental externalities in electricity generation

    International Nuclear Information System (INIS)

    Bohi, D.R.

    1994-01-01

    Applications of the term externality to non environmental matters are often controversial and ambiguous. This paper argues that these externalities are also rarer or less important than sometimes alleged. The paper examines various potential energy security externalities and concludes that none of them are relevant to decisions regarding electric generation. Externalities may exist with regard to effects on local employment and the local infrastructure, although their importance is location specific and their measurement is highly subjective. In short, the consideration of this subset of externalities may confuse policy makers more than it helps them. (author). 15 refs

  16. Security of the electricity supply. The area of conflict between profitability and environmental compatibility; Sicherheit der Elektrizitaetsversorgung. Das Spannungsfeld von Wirtschaftlichkeit und Umweltvertraeglichkeit

    Energy Technology Data Exchange (ETDEWEB)

    Praktiknjo, Aaron

    2013-07-01

    The scope of the book is on the one hand support for the power industry defining investment and sales strategies that intend optimum supply security in the view of the customer and on the other hand the information for energy and environmental politicians demonstrating the conflict of objectives. The following issues are covered: technical and organizational aspects of electricity supply, theoretical background of the security of electricity supply, security of supply for economic sections, security of electricity supply for private households: theoretical microeconomic approach, security of electricity supply for private households: method of defined preferences, security of electricity supply in the context of climate protection and nuclear phase-out.

  17. Promoting Agricultural Research and Development to Strengthen Food Security in South Asia

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This study aims to highlight the status of agricultural R&D in South Asia and contends that creating an effective agricultural research and innovation systems is a vital element to ensure food security in this region. South Asia is home to around one-fourth of mankind and houses the largest proportion of undernourished people in the world. Despite a period of marked economic growth averaging 6% a year over the past two decades, it remains the world's second poorest region contributing a mere 2.2% in global annual GDP. Agriculture is the mainstay of South Asian economy employing around 60% of the total workforce and generating around 20% of total GDP. South Asia has the recognition of being the second most food-insecure region next only to sub-Saharan Africa. Though there is growing evidence that technological innovation has a key role to play in increasing agricultural production and strengthening food security, agricultural research and development (R&D sector has failed to garner sufficient attention till now. This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.

  18. Environmental and climate security: improving scenario methodologies for science and risk assessment

    Science.gov (United States)

    Briggs, C. M.; Carlsen, H.

    2010-12-01

    Governments and popular discussions have increasingly referred to concepts of ‘climate security’, often with reference to IPCC data. Development of effective methodologies to translate complex, scientific data into risk assessments has lagged, resulting in overly simplistic political assumptions of potential impacts. Climate security scenarios have been developed for use by security and military agencies, but effective engagement by scientific communities requires an improved framework. Effective use of data requires improvement both of climate projections, and the mapping of cascading impacts across interlinked, complex systems. In this research we propose a process for systematic generation of subsets of scenarios (of arbitrary size) from a given set of variables with possible interlinkages. The variables could include climatic changes as well as other global changes of concerns in a security context. In coping with possible challenges associated with the nexus of climate change and security - where deep structural uncertainty and possible irreversible changes are of primary interest - it is important to explore the outer limits of the relevant uncertainties. Therefore the proposed process includes a novel method that will help scenario developers in generating scenario sets where the scenarios are in a quantifiable sense maximally different and therefore best ‘span’ the whole set of scenarios. When downscaled onto a regional level, this process can provide guidance to potentially significant and abrupt geophysical changes, where high uncertainty has often prevented communication of risks. Potential physical changes can then be used as starting points for mapping cascading effects across networks, including topological analysis to identify critically vulnerable nodes and fragile systems, the existence of positive or negative feedback loops, and possible intervention points. Advanced knowledge of both potential geo-physical shifts and related non

  19. Arctic Energy Resources: Security and Environmental Implications

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2012-08-01

    Full Text Available n recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the potential circum-polar navigation possibilities. This has led to concerns about the environmental risks of these operations as well as the fear that competition between states for resources might result in conflict. Unresolved offshore boundaries between the Arctic states exacerbate these fears. Yet, the risk of conflict seems overstated considering the bilateral and multilateral steps undertaken by the Arctic states to resolve contentious issues. This article will examine the potential impact of Arctic energy resources on global security as well as the regional environment and examine the actions of concerned states to promote their interests in the region.

  20. Applying environmental product design to biomedical products research.

    Science.gov (United States)

    Messelbeck, J; Sutherland, L

    2000-12-01

    The principal themes for the Biomedical Research and the Environment Conference Committee on Environmental Economics in Biomedical Research include the following: healthcare delivery companies and biomedical research organizations, both nonprofit and for-profit, need to improve their environmental performance; suppliers of healthcare products will be called upon to support this need; and improving the environmental profile of healthcare products begins in research and development (R&D). The committee report begins with requirements from regulatory authorities (e.g., U.S. Environmental Protection Agency [EPA], the U.S. Food and Drug Administration), and the healthcare delivery sector). The 1998 American Hospital Association and EPA Memorandum of Understanding to reduce solid waste and mercury from healthcare facilities is emblematic of these requirements. The dominant message from the requirements discussion is to ensure that R&D organizations do not ignore customer, environmental, and regulatory requirements in the early stages of product development. Several representatives from healthcare products manufacturers presented their companies' approaches to meeting these requirements. They reported on efforts to ensure that their R&D processes are sensitive to the environmental consequences from manufacturing, distributing, using, and disposing of healthcare products. These reports describe representatives' awareness of requirements and the unique approaches their R&D organizations have taken to meet these requirements. All representatives reported that their R&D organizations have embraced environmental product design because it avoids the potential of returning products to R&D to improve the environmental profile. Additionally, several reports detailed cost savings, sustainability benefits, and improvements in environmental manufacturing or redesign, and increased customer satisfaction. Many companies in healthcare delivery are working to improve environmental

  1. Academic Information Security Researchers: Hackers or Specialists?

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-04-01

    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

  2. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  3. Remote sensing applications in environmental research

    CERN Document Server

    Srivastava, Prashant K; Gupta, Manika; Islam, Tanvir

    2014-01-01

    Remote Sensing Applications in Environmental Research is the basis for advanced Earth Observation (EO) datasets used in environmental monitoring and research. Now that there are a number of satellites in orbit, EO has become imperative in today's sciences, weather and natural disaster prediction. This highly interdisciplinary reference work brings together diverse studies on remote sensing and GIS, from a theoretical background to its applications, represented through various case studies and the findings of new models. The book offers a comprehensive range of contributions by well-known scientists from around the world and opens a new window for students in presenting interdisciplinary and methodological resources on the latest research. It explores various key aspects and offers state-of-the-art research in a simplified form, describing remote sensing and GIS studies for those who are new to the field, as well as for established researchers.

  4. Electric Power Infrastructure Reliability And Security Research And Development Initiative. Final report

    International Nuclear Information System (INIS)

    Dale, S.; Meeker, R.; Steurer, M.; Li, H.; Pamidi, S.; Rodrigo, H.; Suryanarayanan, S.; Cartes, D.; Ordonez, J.; Domijan, A.; Liu, W.; Cox, D.; McLaren, P.; Hovsapian, R.; Edwards, D.; Simmons, S.; Wilde, N.; Woodruff, S.; Kopriva, D.; Hussaini, Y.; Mohammed, O.; Zheng, J.; Baldwin, T.L.

    2008-01-01

    This is the final scientific/technical report for the Electric Power Infrastructure Reliability and Security R and D Initiative sponsored by the U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, under award number DE-FG02-05CH11292. This report covers results from the FSU-led, multi-institution effort conducted over the period 8/15/05 to 10/14/2007. Building upon existing infrastructure for power systems research, modeling, and simulation, the Center for Advanced Power Systems (CAPS) at Florida State University (FSU) is developing world-class programs in electric power systems research and education to support future electric power system needs and challenges. With U.S. Department of Energy Support, FSU CAPS has engaged in a multi-faceted effort to conduct basic and applied research towards understanding, developing, and deploying technologies and approaches that can lead to improved reliability and security of the North American electric power generation and delivery infrastructure. This wide-reaching project, through a number of carefully selected thrusts cutting across several research disciplines, set out to address key terrestrial electric utility power system issues and challenges. The challenges and the thrusts to address them were arrived at through analysis of a number of national reports and recommendations combined with input from an experienced multi-disciplined team of power systems research staff and faculty at FSU CAPS. The resulting project effort can be grouped into four major areas: - Power Systems and New Technology Insertion - Controls, Protection, and Security - Simulation Development - High Temperature Superconductivity (HTS)

  5. Managing Wetlands for Improved Food Security in Uganda | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    However, little is known about the contribution of wetland resources to household food security or the environmental impact of using wetlands for agriculture or other purposes. Researchers will ... IDRC is pleased to announce the results of its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  6. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  7. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  8. U.S. DAIRY FORAGE RESEARCH CENTER

    Data.gov (United States)

    Federal Laboratory Consortium — Vision: Leading the world in integrated dairy forage systems research. Mission: Providing dairy industry solutions for food security, environmental sustainability,...

  9. U.S. Dairy Forage Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — Vision: Leading the world in integrated dairy forage systems research. Mission: Providing dairy industry solutions for food security, environmental sustainability,...

  10. COOPEUS - connecting research infrastructures in environmental sciences

    Science.gov (United States)

    Koop-Jakobsen, Ketil; Waldmann, Christoph; Huber, Robert

    2015-04-01

    The COOPEUS project was initiated in 2012 bringing together 10 research infrastructures (RIs) in environmental sciences from the EU and US in order to improve the discovery, access, and use of environmental information and data across scientific disciplines and across geographical borders. The COOPEUS mission is to facilitate readily accessible research infrastructure data to advance our understanding of Earth systems through an international community-driven effort, by: Bringing together both user communities and top-down directives to address evolving societal and scientific needs; Removing technical, scientific, cultural and geopolitical barriers for data use; and Coordinating the flow, integrity and preservation of information. A survey of data availability was conducted among the COOPEUS research infrastructures for the purpose of discovering impediments for open international and cross-disciplinary sharing of environmental data. The survey showed that the majority of data offered by the COOPEUS research infrastructures is available via the internet (>90%), but the accessibility to these data differ significantly among research infrastructures; only 45% offer open access on their data, whereas the remaining infrastructures offer restricted access e.g. do not release raw data or sensible data, demand user registration or require permission prior to release of data. These rules and regulations are often installed as a form of standard practice, whereas formal data policies are lacking in 40% of the infrastructures, primarily in the EU. In order to improve this situation COOPEUS has installed a common data-sharing policy, which is agreed upon by all the COOPEUS research infrastructures. To investigate the existing opportunities for improving interoperability among environmental research infrastructures, COOPEUS explored the opportunities with the GEOSS common infrastructure (GCI) by holding a hands-on workshop. Through exercises directly registering resources

  11. Environmental insurance: research information support

    OpenAIRE

    Rykova Valentina V.

    2015-01-01

    he article describes information resources to support research on the issue of environmental insurance. It represents a brief analysis of a documentary flow, traces its dynamics and typical-thematic structures, shows the most productive journals

  12. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. Sandia National Laboratories: Research: Biodefense

    Science.gov (United States)

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD knowledge to counter disease Sandia conducts research into how pathogens interact and subvert a host's immune response to develop the knowledge base needed to create new novel environmental detectors, medical

  14. What Current Literature Tells Us about Sustainable Diets: Emerging Research Linking Dietary Patterns, Environmental Sustainability, and Economics12

    Science.gov (United States)

    Auestad, Nancy; Fulgoni, Victor L

    2015-01-01

    The concept of sustainable diets, although not new, is gaining increased attention across the globe, especially in relation to projected population growth and growing concerns about climate change. As defined by the FAO (Proceedings of the International Scientific Symposium, Biodiversity and Sustainable Diets 2010; FAO 2012), “Sustainable diets are those diets with low environmental impacts which contribute to food and nutrition security and to healthy life for present and future generations.” Consistent and credible science that brings together agriculture, food systems, nutrition, public health, environment, economics, culture, and trade is needed to identify synergies and trade-offs and to inform guidance on vital elements of healthy, sustainable diets. The aim of this article is to review the emerging research on environmental and related economic impacts of dietary patterns, including habitual eating patterns, nutritionally balanced diets, and a variety of different dietary scenarios. Approaches to research designs, methodologies, and data sources are compared and contrasted to identify research gaps and future research needs. To date, it is difficult to assimilate all of the disparate approaches, and more concerted efforts for multidisciplinary studies are needed. PMID:25593141

  15. Health and environmental research. Summary of accomplishments

    Energy Technology Data Exchange (ETDEWEB)

    1984-04-01

    This is a short account of a 40-year-old health and environmental research program performed in national laboratories, universities, and research institutes. Under the sponsorship of the federal agencies that were consecutively responsible for the national energy mission, this research program has contributed to the understanding of the human health and environmental effects of emergining energy technologies. In so doing, it has also evolved several nuclear techniques for the diagnosis and treatment of human ills. The form of this presentation is through examples of significant, tangible accomplishments in each of these areas at certain times to illustrate the role and impact of the research program. The narrative of this research program concludes with a perspective of its past and a prospectus on its future.

  16. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  17. Lawrence Livermore National Laboratory Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Henry E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Armstrong, Dave [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Blake, Rick G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bertoldo, Nicholas A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Cerruti, Steven J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Fish, Craig [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dibley, Valerie R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Doman, Jennifer L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grayson, Allen R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Heidecker, Kelly R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hollister, Rod K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kumamoto, Gene [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, Donald H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Nelson, Jennifer C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Ottaway, Heather L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Paterson, Lisa E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Revelli, Michael A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rosene, Crystal A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Terrill, Alison A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wegrecki, Anthony M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wilson, Kent R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Woollett, Jim S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2013-09-19

    Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security, LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the

  18. Lawrence Livermore National Laboratory Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Jones, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bertoldo, N. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Blake, R. G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Cerruti, S. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dibley, V. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Doman, J. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Fish, C. B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Grayson, A. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Heidecker, K. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kumamoto, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, D. H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Montemayor, W. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Ottaway, H. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Paterson, L. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Revelli, M. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rosene, C. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Terrill, A. A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wegrecki, A. M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wilson, K. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Woollett, J. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Veseliza, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-10-01

    Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security, LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the

  19. Water and Environmental Research Institute of the Western Pacific

    Science.gov (United States)

    Water and Environmental Research Institute of the Western Pacific - University of Guam Skip to main entered the website of the Water and Environmental Research Institute of the Western Pacific (WERI) at the CNMI and the FSM. Research Programs Weather and Climate Surface Water & Watersheds Groundwater &

  20. Environmental Behavior and Gender: An Emerging Area of Concern for Environmental Education Research

    Science.gov (United States)

    Sakellari, Maria; Skanavis, Constantina

    2013-01-01

    Ecofeminism suggests that women are more active than men regarding environmental issues for a variety of social, cultural, and biological reasons. In support to these arguments, women predominate within the overall grassroots of the Environmental Justice movement. However, claims have been made that environmental education theory and research are…

  1. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    29 sept. 2016 ... Jemimah Njuki is a senior program officer in the Agriculture and Food Security program at the International Development Research Centre (IDRC), based in Nairobi, Kenya. John R. Parkins is a professor in the Department of Resource Economics and Environmental Sociology, University of Alberta, Canada ...

  2. Participant Action Research and Environmental Education

    Directory of Open Access Journals (Sweden)

    Yasmin Coromoto Requena Bolívar

    2018-02-01

    Full Text Available The committed participation of the inhabitants in diverse Venezuelan communities is fundamental in the search of solution to environmental problems that they face in the daily life; in the face of this reality, studies based on Participant Action Research were addressed, through a review and documentary analysis of four works related to community participation, carried out in the state of Lara. For this, the following question was asked: ¿What was the achievement in the solution of environmental problems in the communities, reported through the master's degree works oriented under participant action research and presented to Yacambú University in 2011-2013? A qualitative approach is used, approaching the information according to the stages suggested by Arias (2012: Search of sources, initial reading of documents, preparation of the preliminary scheme, data collection, analysis and interpretation of the information, formulation of the final scheme, introduction and conclusions, final report. It begins with the definition of the units of analysis and inquiry of the literature, through theoretical positions, concepts and contributions on: participant action research, participation and environmental education, to culminate with the analysis and interpretation of the information and the conclusions of this investigation. For the collection of the data, the bibliographic records were used with the purpose of organizing the information on the researches consulted, and of summary for the synthesis of the documents. It was concluded that, in the analyzed degree works, the purpose of the IAP was fulfilled, which consisted in the transformation of the problem-situation, which allowed the IAP to become the propitious scenario to promote environmental participation and education not formal.

  3. Environmental TEM for Materials Research

    DEFF Research Database (Denmark)

    Hansen, Thomas Willum

    Over the last decades, electron microscopy has played a large role in materials research. The increasing use of particularly environmental transmission electron microscopy (ETEM) in materials science provides new possibilities for investigating nanoscale components at work. Careful experimentation...

  4. Environmental TEM in Materials Research

    DEFF Research Database (Denmark)

    Hansen, Thomas Willum; Wagner, Jakob Birkedal

    Over the last decades, electron microscopy has played a large role in materials research. The increasing use of particularly environmental transmission electron microscopy (ETEM) in materials science provides new possibilities for investigating nanoscale components at work. Careful experimentation...

  5. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  6. Strengthening Environmental Economics Capacity in Research on ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strengthening Environmental Economics Capacity in Research on Climate Change Adaptation ... They will develop environmental economics methods to address specific climate change challenges caused by extreme weather stressors. ... Initiative Villes ciblées : gestion des déchets urbains à Cochabamba, en Bolivie.

  7. Environmental Sciences Division: Summaries of research in FY 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    This document describes the Fiscal Year 1996 activities and products of the Environmental Sciences Division, Office of Biological and Environmental Research, Office of Energy Research. The report is organized into four main sections. The introduction identifies the basic program structure, describes the programs of the Environmental Sciences Division, and provides the level of effort for each program area. The research areas and project descriptions section gives program contact information, and provides descriptions of individual research projects including: three-year funding history, research objective and approach used in each project, and results to date. Appendixes provide postal and e-mail addresses for principal investigators and define acronyms used in the text. The indexes provide indexes of principal investigators, research institutions, and keywords for easy reference. Research projects are related to climatic change and remedial action.

  8. Socio-Environmental Systems (SES) Research

    NARCIS (Netherlands)

    Turner, B.L.; Esler, Karen J.; Bridgewater, Peter; Leemans, Rik

    2016-01-01

    The call for integrated social-environmental science, complete with outreach to applications and solutions, is escalating worldwide. Drawing on several decades of experience, researchers engaged in such science, completed an assessment of the design and management attributes and impact pathways

  9. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  10. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  11. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  12. The use of environmental, health and safety research in nanotechnology research.

    Science.gov (United States)

    Youtie, Jan; Porter, Alan; Shapira, Philip; Tang, Li; Benn, Troy

    2011-01-01

    Environmental, health, and safety (EHS) concerns are receiving considerable attention in nanoscience and nanotechnology (nano) research and development (R&D). Policymakers and others have urged that research on nano's EHS implications be developed alongside scientific research in the nano domain rather than subsequent to applications. This concurrent perspective suggests the importance of early understanding and measurement of the diffusion of nano EHS research. The paper examines the diffusion of nano EHS publications, defined through a set of search terms, into the broader nano domain using a global nanotechnology R&D database developed at Georgia Tech. The results indicate that nano EHS research is growing rapidly although it is orders of magnitude smaller than the broader nano S&T domain. Nano EHS work is moderately multidisciplinary, but gaps in biomedical nano EHS's connections with environmental nano EHS are apparent. The paper discusses the implications of these results for the continued monitoring and development of the cross-disciplinary utilization of nano EHS research.

  13. Energy and non-traditional security (NTS) in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  14. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  15. Environmental policy challenge crime in Republic Serbia and its impact on environmental safety

    Directory of Open Access Journals (Sweden)

    Jović Vojislav

    2014-01-01

    Full Text Available Environmental law and ecological security representing nearly two related fields that have a scientific discipline in our legal security framework introduced in the first decade of this century. Despite this fact, the legal norms that regulate the protection and safety of the environment have been studied in the framework of other disciplines, and their etymology suggests that environmental regulations have existed in the ninth century, first as a prohibitive provision 'is prohibited'. It is known that environmental law to a certain extent based on criminal law norms and the norms of a protective object with the environment - Ekos. The fact of regulation of a large number of offenses in this field indicates the significance of the criminal policy which is in the field of environmental law and environmental security provides criminal protection. In this paper, in addition to general introductory remarks on environmental law, environmental safety and environmental tort, consider the area of combating environmental crime, the share of primary and secondary subjects of criminal procedural and international cooperation, particularly in combating transnational environmental crime. In the end, considering the environmental impact of crime on ecological security, clarifying the possible forms of threats and extent of the reaction.

  16. Environmental Measurements Laboratory 1994 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Chieco, N.A. [ed.; Krey, P.W.; Beck, H.L.

    1995-08-01

    This report summarizes the activities of the Environmental Measurements Laboratory (EML) for the calendar year 1994 and it serves as an annual report to the Director of the Office of Energy Research (ER), the Associate Director and staff of the Office of Health and Environmental Research (OHER), the manager and staff of the Chicago Field Office, and the authors colleagues. Emphasized are the progress and accomplishments of the year, rather than future plans or expectations. The technical summaries are grouped according to the following seven general program areas: environmental radiation and radioactivity; radiation transport and dosimetry; environmental radon, thoron, and related aerosols; atmospheric and surface pollutant studies related to global climate change; atmospheric chemistry; metrology, consultation, and emergency response; environmental management. EML`s mission is to address important scientific questions concerning human health and environmental impacts. Through its multidisciplinary staff, EML conducts experimental and theoretical research on radioactive and other energy-related pollutants, and provides DOE and other federal agencies with the in-house capability to respond effectively and efficiently with regard to quality assurance activities, environmental issues and related national security issues.

  17. Environmental Measurements Laboratory 1994 annual report

    International Nuclear Information System (INIS)

    Chieco, N.A.; Krey, P.W.; Beck, H.L.

    1995-08-01

    This report summarizes the activities of the Environmental Measurements Laboratory (EML) for the calendar year 1994 and it serves as an annual report to the Director of the Office of Energy Research (ER), the Associate Director and staff of the Office of Health and Environmental Research (OHER), the manager and staff of the Chicago Field Office, and the authors colleagues. Emphasized are the progress and accomplishments of the year, rather than future plans or expectations. The technical summaries are grouped according to the following seven general program areas: environmental radiation and radioactivity; radiation transport and dosimetry; environmental radon, thoron, and related aerosols; atmospheric and surface pollutant studies related to global climate change; atmospheric chemistry; metrology, consultation, and emergency response; environmental management. EML's mission is to address important scientific questions concerning human health and environmental impacts. Through its multidisciplinary staff, EML conducts experimental and theoretical research on radioactive and other energy-related pollutants, and provides DOE and other federal agencies with the in-house capability to respond effectively and efficiently with regard to quality assurance activities, environmental issues and related national security issues

  18. 78 FR 6087 - Biological and Environmental Research Advisory Committee

    Science.gov (United States)

    2013-01-29

    ... DEPARTMENT OF ENERGY Biological and Environmental Research Advisory Committee AGENCY: Office of... the Biological and Environmental Research Advisory Committee (BERAC). The Federal Advisory Committee... Federal Officer, BERAC, U.S. Department of Energy, Office of Science, Office of Biological and...

  19. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  20. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  1. Environmental Measurements Laboratory, annual report 1995

    Energy Technology Data Exchange (ETDEWEB)

    Krey, P.W.; Heit, M. [eds.

    1996-07-01

    This report summarizes the activities of the Environmental Measurements Laboratory (EML) for the calendar year 1995 and serves as an annual report to the Director of the Office of Energy Research (ER), the Associate Director and staff of the Office of Health and Environmental Research (OHER), the Manager and staff of the Chicago Operations Office, and our colleagues. Emphasized are the progress and accomplishments of the year, rather than future plans or expectations. The technical summaries are grouped according to the following seven research program areas: (1) Environmental Radiation and Radioactivity; (2) Radiation Transport and Dosimetry; (3) Environmental Radon, Thoron, and Related Aerosols; (4) Atmospheric and Surface Pollutant Studies Related to Global Climate Change; (5) Atmospheric Chemistry; and (6) Metrology, Consultation, and Emergency Response Environmental Management The mission of EML is to address important scientific questions concerning human health and environmental impacts. Through its multidisciplinary staff, EML conducts experimental and theoretical research on radioactive and other energy-related pollutants and provides DOE and other federal agencies with the in-house capability to respond effectively and efficiently with regard to quality assurance activities, environmental issues, and related national security issues.

  2. Environmental Measurements Laboratory, annual report 1995

    International Nuclear Information System (INIS)

    Krey, P.W.; Heit, M.

    1996-07-01

    This report summarizes the activities of the Environmental Measurements Laboratory (EML) for the calendar year 1995 and serves as an annual report to the Director of the Office of Energy Research (ER), the Associate Director and staff of the Office of Health and Environmental Research (OHER), the Manager and staff of the Chicago Operations Office, and our colleagues. Emphasized are the progress and accomplishments of the year, rather than future plans or expectations. The technical summaries are grouped according to the following seven research program areas: (1) Environmental Radiation and Radioactivity; (2) Radiation Transport and Dosimetry; (3) Environmental Radon, Thoron, and Related Aerosols; (4) Atmospheric and Surface Pollutant Studies Related to Global Climate Change; (5) Atmospheric Chemistry; and (6) Metrology, Consultation, and Emergency Response Environmental Management The mission of EML is to address important scientific questions concerning human health and environmental impacts. Through its multidisciplinary staff, EML conducts experimental and theoretical research on radioactive and other energy-related pollutants and provides DOE and other federal agencies with the in-house capability to respond effectively and efficiently with regard to quality assurance activities, environmental issues, and related national security issues

  3. Empirical research on international environmental migration: a systematic review.

    Science.gov (United States)

    Obokata, Reiko; Veronis, Luisa; McLeman, Robert

    2014-01-01

    This paper presents the findings of a systematic review of scholarly publications that report empirical findings from studies of environmentally-related international migration. There exists a small, but growing accumulation of empirical studies that consider environmentally-linked migration that spans international borders. These studies provide useful evidence for scholars and policymakers in understanding how environmental factors interact with political, economic and social factors to influence migration behavior and outcomes that are specific to international movements of people, in highlighting promising future research directions, and in raising important considerations for international policymaking. Our review identifies countries of migrant origin and destination that have so far been the subject of empirical research, the environmental factors believed to have influenced these migrations, the interactions of environmental and non-environmental factors as well as the role of context in influencing migration behavior, and the types of methods used by researchers. In reporting our findings, we identify the strengths and challenges associated with the main empirical approaches, highlight significant gaps and future opportunities for empirical work, and contribute to advancing understanding of environmental influences on international migration more generally. Specifically, we propose an exploratory framework to take into account the role of context in shaping environmental migration across borders, including the dynamic and complex interactions between environmental and non-environmental factors at a range of scales.

  4. Pacific Northwest Laboratory: Director`s overview of research performed for DOE Office of Health And Environmental Research

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    A significant portion of the research undertaken at Pacific Northwest Laboratory (PNL) is focused on the strategic programs of the US Department of Energy`s (DOE) Office of Health and Environmental Research (OHER). These programs, which include Environmental Processes (Subsurface Science, Ecosystem Function and Response, and Atmospheric Chemistry), Global Change (Climate Change, Environmental Vulnerability, and Integrated Assessments), Biotechnology (Human Genome and Structural Biology), and Health (Health Effects and Medical Applications), have been established by OHER to support DOE business areas in science and technology and environmental quality. PNL uses a set of critical capabilities based on the Laboratory`s research facilities and the scientific and technological expertise of its staff to help OHER achieve its programmatic research goals. Integration of these capabilities across the Laboratory enables PNL to assemble multidisciplinary research teams that are highly effective in addressing the complex scientific and technical issues associated with OHER-sponsored research. PNL research efforts increasingly are focused on complex environmental and health problems that require multidisciplinary teams to address the multitude of time and spatial scales found in health and environmental research. PNL is currently engaged in research in the following areas for these OHER Divisions: Environmental Sciences -- atmospheric radiation monitoring, climate modeling, carbon cycle, atmospheric chemistry, ecological research, subsurface sciences, bioremediation, and environmental molecular sciences; Health Effects and Life Sciences -- cell/molecular biology, and biotechnology; Medical Applications and Biophysical Research -- analytical technology, and radiological and chemical physics. PNL`s contributions to OHER strategic research programs are described in this report.

  5. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    Science.gov (United States)

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  6. Applied Science Division annual report, Environmental Research Program FY 1983

    International Nuclear Information System (INIS)

    Cairns, E.J.; Novakov, T.

    1984-05-01

    The primary concern of the Environmental Research Program is the understanding of pollutant formation, transport, and transformation and the impacts of pollutants on the environment. These impacts include global, regional, and local effects on the atmosphere and hydrosphere, and on certain aspects of human health. This multidisciplinary research program includes fundamental and applied research in physics, chemistry, engineering, and biology, as well as research on the development of advanced methods of measurement and analysis. During FY 1983, research concentrated on atmospheric physics and chemistry, applied physics and laser spectroscopy, combustion theory and phenomena, environmental effects of oil shale processing, freshwater ecology and acid precipitation, trace element analysis for the investigation of present and historical environmental impacts, and a continuing survey of instrumentation for environmental monitoring

  7. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  8. Center for Urban Environmental Research and Education (CUERE)

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Urban Environmental Research and Education (CUERE) at UMBC was created in 2001 with initial support from the U.S. Environmental Protection Agency and...

  9. Nigerian Journal of Soil and Environmental Research

    African Journals Online (AJOL)

    The Nigerian Journal of Soil and Environmental Research (previously named Nigerian Journal of Soil Research) is an annual publication of the Department of Soil science, Faculty of Agriculture/Institute for Agricultural Research, Ahmadu Bello University, Zaira. The journal accepts articles in English. The journal is ...

  10. Hazardous waste treatment and environmental remediation research

    International Nuclear Information System (INIS)

    1989-01-01

    Los Alamos National Laboratory (LANL) is currently evaluating hazardous waste treatment and environmental remediation technologies in existence and under development to determine applicability to remediation needs of the DOE facilities under the Albuquerque Operations Office and to determine areas of research need. To assist LANL is this effort, Science Applications International Corporation (SAIC) conducted an assessment of technologies and monitoring methods that have been demonstrated or are under development. The focus of this assessment is to: (1) identify existing technologies for hazardous waste treatment and environmental remediation of old waste sites; (2) identify technologies under development and the status of the technology; (3) assess new technologies that need development to provide adequate hazardous waste treatment and remedial action technologies for DOD and DOE sites; and (4) identify hazardous waste and remediation problems for environmental research and development. There are currently numerous research and development activities underway nationwide relating to environmental contaminants and the remediation of waste sites. To perform this effort, SAIC evaluated current technologies and monitoring methods development programs in EPA, DOD, and DOE, as these are the primary agencies through which developmental methods are being demonstrated. This report presents this evaluation and provides recommendations as to pertinent research needs or activities to address waste site contamination problems. The review and assessment have been conducted at a programmatic level; site-specific and contaminant-specific evaluations are being performed by LANL staff as a separate, related activity

  11. Research on information security in big data era

    Science.gov (United States)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  12. Effects of Alternative Framing on the Publics Perceived Importance of Environmental Conservation

    Directory of Open Access Journals (Sweden)

    Amanda E Sorensen

    2015-05-01

    Full Text Available Effective communication of science to the general public is important for numerous reasons, including support for policy, funding, informed public decision making, among others. Prior research has found that scientists participating in public policy and public communication must frame their communication efforts in order to connect with audiences. A frame is the mechanism that individuals use to understand and interpret the world around them. Framing can encourage specific interpretations and reference points for a particular issue or event; especially when meaning is negotiated between the media and public audiences. In this study, we looked at the effect of framing within an environmental conservation context. To do this we had survey respondents rank common issues, among them being environmental conservation, from most important to least important for the government to address. We framed environmental conservation using three synonymous terms (environmental security, ecosystem services, and environmental quality to assess whether there was an effect on rankings dependent on how we framed environmental conservation. We also investigated the effect of individuals’ personality characteristics (identity frame on those environmental conservation rankings. We found that individuals who self-identified as environmentalist were positively associated with ranking highly (most important environmental conservation when it was framed as either environmental quality or ecosystem services, but not when it was framed as environmental security. Conversely, those individuals who did not rank themselves highly as self-identified environmentalists were positively associated with environmental conservation when it was framed as environmental security. This research suggests that framing audience specific messages can engender audience support in hot-button issues such as environmental conservation and climate change.

  13. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  14. Environmental security and gas exports

    International Nuclear Information System (INIS)

    Bankes, N.

    1996-01-01

    It is argued that Canadian regulatory commissions have systematically rebuffed efforts by environmental groups to review their concerns regarding the cumulative environmental effects of oil and gas exploration and development in western Canada. The concerns include the opening-up of wilderness areas through access roads construction, exploratory drilling, environmental degradation caused by pipeline construction and gas processing plants, and the cumulative effects on air, and water quality, loss of habitat, etc. The author is of the opinion that the decisions have been based on policy considerations and not on law, and in making the decisions the courts ignored policy questions raised by the environmental groups in favor of those advanced by gas interests. Specifically, the author provided a critique of the decision of the Alberta Court of Appeal in the matter of Rocky Mountain Ecosystem Coalition (RMEC) vs. Alberta Energy and Utilities Board (AEUB). He also proposed an appropriate forum and method for considering the issues involved, and a mechanism to ensure that the cumulative effects of ongoing gas exploration do not undermine ecosystem health

  15. Energy security from the Russian perspective. Think pipes not rockets

    Energy Technology Data Exchange (ETDEWEB)

    Gudowski, Waclaw

    2008-07-01

    The presentation reviews the understanding of energy security, the Russian role in the energy source market and discusses how to increase the energy security. Environmental aspects such as climate change, CO2 reduction and the environmental costs of fossil fuel consumption with respect to the energy security are emphasized (tk)

  16. Nuclear methods in environmental and energy research

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, J. R. [ed.

    1977-01-01

    The topics considered in the seven sessions were nuclear methods in atmospheric research; nuclear and atomic methodology; nuclear methods in tracer applications; energy exploration, production, and utilization; nuclear methods in environmental monitoring; nuclear methods in water research; and nuclear methods in biological research. Individual abstracts were prepared for each paper. (JSR)

  17. [Environmental Hazards Assessment Program annual report, June 1992--June 1993]. Summer undergraduate research program: Environmental studies

    Energy Technology Data Exchange (ETDEWEB)

    McMillan, J. [ed.

    1993-12-01

    The purpose of the summer undergraduate internship program for research in environmental studies is to provide an opportunity for well-qualified students to undertake an original research project as an apprentice to an active research scientist in basic environmental research. Ten students from throughout the midwestern and eastern areas of the country were accepted into the program. These students selected projects in the areas of marine sciences, biostatistics and epidemiology, and toxicology. The research experience for all these students and their mentors was very positive. The seminars were well attended and the students showed their interest in the presentations and environmental sciences as a whole by presenting the speakers with thoughtful and intuitive questions. This report contains the research project written presentations prepared by the student interns.

  18. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  19. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  20. Agroenergy production from biomass in integrated agroforestry systems: an alternative to achieve food security and environmental protection

    International Nuclear Information System (INIS)

    Suárez, J.; Martín, G. J.

    2010-01-01

    The objective of this paper is to offer considerations about agroenergy production from biomass in integrated agroforestry systems. At present, worldwide, marked by a group of hazards that threaten human existence, there is a challenge mainly in the rural context: how can the coexistence of agroenergy, food security and environmental protection be achieved?, in the presence of climate changes, environmental degradation, food crises and the growing biofuels vs food contradiction, generated by a senseless policy for obtaining first-generation agrofuels from large extensions of food monocrops, which is morally rejectable. Biofuels are also considered an ecological alternative to fossil fuels, because of their reduction capacity in the emission of greenhouse gasses and because they promote the development of rural communities in southern countries; this is enhanced in integrated agroforestry systems, in which biofuels, of first as well as second generation, can be produced, especially with the application of the concept of biorefinery which allows converting biomass into many products, which total added value can be higher than the one generated by fossil fuels. International projects, which promote integrated and sustainable food and energy production in the context of agroforestry integrated systems, at local scale, contribute to this purpose. The authors consider that the execution of projects and experiences about agroenergy has the main objective of achieving energetic sustainability and food security at local scale, in rural areas, taking into account environmental protection. (author)

  1. FY 1990 environmental research programs for the Nevada Operations Office. Work plan and quarterly reports, first through fourth quarter reports

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1990-11-01

    This work includes a wide range of research and support activities associated with the Weapons Testing Program conducted at the Nevada Test Site (NTS). Ongoing and new environmental research programs to be conducted by DRI over the period of this contract include archaeological studies and site mitigation plans; offsite community radiation monitoring support; environmental compliance activities related to state and federal regulations; hydrologic assessment of containment of underground nuclear detonations; hydrology/radionuclide investigations designed to better understand and predict the possible subsurface movement of radionuclides at the NTS; and support of various statistical and data management and design activities. In addition to these, archaeological and other activities will be carried out in support of the Yucca Mountain Project. Other areas of the overall program which require DRI support are classified security activities, radiation safety and training, quality assurance and control, computer protection and historical data management, derivative classification of DRI documents, and preparation of any special reports not included in the requirements of the individual projects.

  2. Reflections on the State of Research: Indoor Environmental Quality

    DEFF Research Database (Denmark)

    Clausen, Geo; Bekö, Gabriel; Corsi, Richard

    2011-01-01

    that with parallel research and writing efforts culminating with internal review and revision cycles. In this paper, we present our choices for the most important research findings on indoor environmental quality from the past three decades followed by a discussion of the most important research questions in our......More than 30 years after the First International Indoor Climate Symposium, ten researchers from the USA, Slovakia, Sweden, and Denmark gathered to review the current status of indoor environmental research. We initiated our review with discussions during the 1-day meeting and followed...

  3. Designing Research in Environmental Education Curriculum Policy ...

    African Journals Online (AJOL)

    There is increasing dissatisfaction at many levels with existing environmental education curricula in southern Africa. The resulting change and innovation is opening up possibilities for innovative research into the construction, conceptualisation and implementation of the curriculum. However, researching the curriculum ...

  4. Environmental Science and Research Foundation annual technical report: Calendar year 1996

    International Nuclear Information System (INIS)

    Morris, R.C.; Blew, R.D.

    1997-01-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation's mission to DOE-ID provides support in several key areas. The authors conduct an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provide environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research in the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. The major accomplishments of the Foundation and its University Affiliates during the calendar year 1996 are discussed

  5. Environmental Science and Research Foundation annual technical report: Calendar year 1996

    Energy Technology Data Exchange (ETDEWEB)

    Morris, R.C.; Blew, R.D. [eds.

    1997-07-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation`s mission to DOE-ID provides support in several key areas. The authors conduct an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provide environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research in the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. The major accomplishments of the Foundation and its University Affiliates during the calendar year 1996 are discussed.

  6. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint.

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-30

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  7. West African Journal of Industrial and Academic Research ...

    African Journals Online (AJOL)

    Computer networks, Satellite & communications Engineering Research • Industrial Computer applications ... Information Assurance & Network Security: The African Dilemma ... E-Waste Management Environmental Protection • Management ...

  8. Managing Security Risks in an Industrial Investment – Analysis Directions

    Directory of Open Access Journals (Sweden)

    Stefan Dragomir

    2016-05-01

    Full Text Available This paper achieved an analysis of some important management strategies for an investment, in correlation with index of global pollution. Environmental security assessment shall be determined taking into account the workplace security and effects on health, safety of workers in an industry investment. It is necessary to observe and collect a larger number of data generated by the development of an industrial process, so as to make a deep analysis on global pollution index and how it is affected industrial investment environment. This research shows how can the substances that infest the environment to produce much damage and influence the environmental factors (air, water, soil, landscape, fauna and flora. When we know the risks that characterize the plant equipment, we can protect the life and we can protect the environment for a sustainable development in the future.

  9. Environmental Systems Research Candidates Program--FY2000 Annual report

    Energy Technology Data Exchange (ETDEWEB)

    Piet, Steven James

    2001-01-01

    The Environmental Systems Research Candidates (ESRC) Program, which is scheduled to end September 2001, was established in April 2000 as part of the Environmental Systems Research and Analysis Program at the Idaho National Engineering and Environmental Laboratory (INEEL) to provide key science and technology to meet the clean-up mission of the U.S. Department of Energy Office of Environmental Management, and perform research and development that will help solve current legacy problems and enhance the INEEL’s scientific and technical capability for solving longer-term challenges. This report documents the progress and accomplishments of the ESRC Program from April through September 2000. The ESRC Program consists of 24 tasks subdivided within four research areas: A. Environmental Characterization Science and Technology. This research explores new data acquisition, processing, and interpretation methods that support cleanup and long-term stewardship decisions. B. Subsurface Understanding. This research expands understanding of the biology, chemistry, physics, hydrology, and geology needed to improve models of contamination problems in the earth’s subsurface. C. Environmental Computational Modeling. This research develops INEEL computing capability for modeling subsurface contaminants and contaminated facilities. D. Environmental Systems Science and Technology. This research explores novel processes to treat waste and decontaminate facilities. Our accomplishments during FY 2000 include the following: • We determined, through analysis of samples taken in and around the INEEL site, that mercury emissions from the INEEL calciner have not raised regional off-INEEL mercury contamination levels above normal background. • We have initially demonstrated the use of x-ray fluorescence to image uranium and heavy metal concentrations in soil samples. • We increased our understanding of the subsurface environment; applying mathematical complexity theory to the problem of

  10. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    Science.gov (United States)

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  11. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  12. 77 FR 6826 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2012-02-09

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... environmental research and education. Agenda: Wednesday, March 14, 2012 Update on NSF environmental research and... Science Foundation announces the following meeting: Name: Advisory Committee for Environmental Research...

  13. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    OpenAIRE

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues asso...

  14. Partnership of Environmental Education and Research-A compilation of student research, 1999-2008

    Science.gov (United States)

    Bradley, Michael W.; Armstrong, Patrice; Byl, Thomas D.

    2011-01-01

    The U.S. Geological Survey (USGS) Tennessee Water Science Center and the College of Engineering and Technology at Tennessee State University developed a Partnership in Environmental Education and Research (PEER) to support environmental research at TSU and to expand the environmental research capabilities of the USGS in Tennessee. The PEER program is driven by the research needs to better define the occurrence, fate, and transport of contaminants in groundwater and surface water. Research in the PEER program has primarily focused on the transport and remediation of organic contamination in karst settings. Research conducted through the program has also expanded to a variety of media and settings. Research areas include contaminant occurrence and transport, natural and enhanced bioremediation, geochemical conditions in karst aquifers, mathematical modeling for contaminant transport and degradation, new methods to evaluate groundwater contamination, the resuspension of bacteria from sediment in streams, the use of bioluminescence and chemiluminescence to identify the presence of contaminants, and contaminant remediation in wetlands. The PEER program has increased research and education opportunities for students in the College of Engineering, Technology, and Computer Science and has provided students with experience in presenting the results of their research. Students in the program have participated in state, regional, national and international conferences with more than 140 presentations since 1998 and more than 40 student awards. The PEER program also supports TSU outreach activities and efforts to increase minority participation in environmental and earth science programs at the undergraduate and graduate levels. TSU students and USGS staff participate in the TSU summer programs for elementary and high school students to promote earth sciences. The 2007 summer camps included more than 130 students from 20 different States and Washington DC.

  15. the power and promise of feminist research in environmental

    African Journals Online (AJOL)

    methods and methodologies in environmental education research. This exploration ... ty of work in environmental education to date has ... Table 1: Ranking of environmental issues by Australian women compared with the scientific- ..... taneous empowerment and disenchantment .... A good deal of poststructural feminist.

  16. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  17. Environmental futures research: experiences, approaches, and opportunities

    Science.gov (United States)

    David N., comp. Bengston

    2012-01-01

    These papers, presented in a special session at the International Symposium on Society and Resource Management in June 2011, explore the transdisciplinary field of futures research and its application to long-range environmental analysis, planning, and policy. Futures research began in the post-World War II era and has emerged as a mature research field. Although the...

  18. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  19. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  20. Professional Autonomy and Security Risks of Journalists in Colombia

    Directory of Open Access Journals (Sweden)

    Miguel E. Garcés Prettel

    2017-01-01

    Full Text Available This paper analyzes the relationship between professional autonomy and security risks of journalists in Colombia. A correlational-transversal research was conducted with a sample of 751 journalists who filled out the questionnaire “Worlds of Journalism Study”. The results show significant differences on the attacks received by the journalists depending on gender, news beat, region, news media, years of experience, capacity and educational level of journalists. Attacks on journalists correlates positively with the autonomy to publish and write news on governments, armed forces, criminal gangs and structural social problems (poverty, status of ethnic minorities, socioeconomic inequality, environmental damage the latter being a predictor of high risk security.

  1. Environmental Science and Research Foundation, Inc. annual technical report: Calendar year 1997

    Energy Technology Data Exchange (ETDEWEB)

    Reynolds, R.D.; Warren, R.W. [eds.

    1998-05-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation`s mission to DOE-ID provides support in several key areas. The Foundation conducts an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provides environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research on the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. Summaries are included of the individual research projects.

  2. Environmental Science and Research Foundation, Inc. annual technical report: Calendar year 1997

    International Nuclear Information System (INIS)

    Reynolds, R.D.; Warren, R.W.

    1998-05-01

    This Annual Technical Report describes work conducted for the Department of Energy, Idaho Operations Office (DOE-ID), by the Environmental Science and Research Foundation (Foundation). The Foundation's mission to DOE-ID provides support in several key areas. The Foundation conducts an environmental monitoring and surveillance program over an area covering much of the upper Snake River Plain, and provides environmental education and support services related to Idaho National Engineering and Environmental Laboratory (INEEL) natural resource issues. Also, the Foundation, with its University Affiliates, conducts ecological and radioecological research on the Idaho National Environmental Research Park. This research benefits major DOE-ID programs including Waste Management, Environmental Restoration, Spent Nuclear Fuels, and Land Management Issues. Summaries are included of the individual research projects

  3. Environmental assessment for relocation of NREL research experiments

    International Nuclear Information System (INIS)

    1992-06-01

    In compliance with the National Environmental Policy Act (NEPA), the Department of Energy (DOE) has prepared this environmental assessment (DOE/EA-0619) to evaluate the environmental consequences associated with the conduct of ongoing research activities of its National Renewable Energy Laboratory proposed to be relocated to leased commercial laboratory and warehouse space at 6800 Joyce Sum, in Arvada, Colorado. NREL is currently leasing space in Golden, Colorado, for conduct of the research actions discussed in the EA. The research project proposed for relocation is the Amorphous silicon Deposition Laboratory (ASDL). Additionally, it may be financially desirable to relocate the Scanning Hartman Optical Tester (SHOT) and the Whole Building Test Facility at a later date, therefore, the consequences of their operation at the proposed facility is evaluated in the EA to support such future decisions. The new location can also provide additional warehouse space required by NREL

  4. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  5. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  6. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  7. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  8. Environmental Biotechnology Research and Development Program 1989-1992

    NARCIS (Netherlands)

    Brinkman J; Rulkens WH; Visscher K

    1989-01-01

    This report is an English translation of the Dutch Research and Development Program on environmental biotechnology 1989-1992. In this program an overview is given of the recent developments in environmental biotechnology. Based on this overview, the possibilities of biotechnology for management

  9. Seventh International Symposium on Recent Advances in Environmental Health Research

    Directory of Open Access Journals (Sweden)

    Paul B. Tchounwou

    2011-06-01

    Full Text Available This special issue of International Journal of Environmental Research and Public Health is dedicated to the publication of selected papers presented at the Seventh International Symposium on Recent Advances in Environmental Health Research. The Symposium was organized by Jackson State University (JSU from September 12–15, 2010 at the Marriott Hotel in Jackson, Mississippi. It was built upon the overwhelming success of previous symposia hosted by JSU and co-sponsored by the National Institutes of Health (NIH RCMI-Center for Environmental Health, the U.S. Department of Education Title III Graduate Education Program, the U.S. Environmental Protection Agency, the JSU Office of Academic Affairs, and the JSU Office of Research and Federal Relations. [...

  10. Sixth International Symposium on Recent Advances in Environmental Health Research

    Directory of Open Access Journals (Sweden)

    Paul B. Tchounwou

    2010-05-01

    Full Text Available This special issue of International Journal of Environmental Research and Public Health highlights selected papers presented at the Sixth International Symposium on Recent Advances in Environmental Health Research organized by Jackson State University (JSU from September 13−16, 2009 at the Marriott Hotel in Jackson, Mississippi, USA. The Symposium was built upon the overwhelming success of previous symposia hosted by JSU and co-sponsored by the National Institutes of Health (NIH RCMI-Center for Environmental Health, the U.S. Department of Education Title III Graduate Education Program, the U.S. Environmental Protection Agency, the JSU Office of Academic Affairs, and the JSU Office of Research and Federal Relations. [...

  11. Development research: The environmental challenge

    International Nuclear Information System (INIS)

    Winpenny, J.T.

    1991-01-01

    This book represents papers from a 1990 conference 'The environment, Development and Economic Research'. The focus of the book is the environmental and natural resource use problems, though economic development is a strong co-theme. Chapters cover the following topic areas: international issues; macroeconomic policies; natural resource degradation; urban problems; social dimensions; bio-diversity; energy; economic valuation

  12. Environmental research program. 1995 Annual report

    Energy Technology Data Exchange (ETDEWEB)

    Brown, N.J.

    1996-06-01

    The objective of the Environmental Research Program is to enhance the understanding of, and mitigate the effects of pollutants on health, ecological systems, global and regional climate, and air quality. The program is multidisciplinary and includes fundamental research and development in efficient and environmentally benign combustion, pollutant abatement and destruction, and novel methods of detection and analysis of criteria and noncriteria pollutants. This diverse group conducts investigations in combustion, atmospheric and marine processes, flue-gas chemistry, and ecological systems. Combustion chemistry research emphasizes modeling at microscopic and macroscopic scales. At the microscopic scale, functional sensitivity analysis is used to explore the nature of the potential-to-dynamics relationships for reacting systems. Rate coefficients are estimated using quantum dynamics and path integral approaches. At the macroscopic level, combustion processes are modelled using chemical mechanisms at the appropriate level of detail dictated by the requirements of predicting particular aspects of combustion behavior. Parallel computing has facilitated the efforts to use detailed chemistry in models of turbulent reacting flow to predict minor species concentrations.

  13. Toward sustainable environmental quality: Identifying priority research questions for Latin America.

    Science.gov (United States)

    Furley, Tatiana Heid; Brodeur, Julie; Silva de Assis, Helena C; Carriquiriborde, Pedro; Chagas, Katia R; Corrales, Jone; Denadai, Marina; Fuchs, Julio; Mascarenhas, Renata; Miglioranza, Karina Sb; Miguez Caramés, Diana Margarita; Navas, José Maria; Nugegoda, Dayanthi; Planes, Estela; Rodriguez-Jorquera, Ignacio Alejandro; Orozco-Medina, Martha; Boxall, Alistair Ba; Rudd, Murray A; Brooks, Bryan W

    2018-05-01

    The Global Horizon Scanning Project (GHSP) is an innovative initiative that aims to identify important global environmental quality research needs. Here we report 20 key research questions from Latin America (LA). Members of the Society of Environmental Toxicology and Chemistry (SETAC) LA and other scientists from LA were asked to submit research questions that would represent priority needs to address in the region. One hundred questions were received, then partitioned among categories, examined, and some rearranged during a workshop in Buenos Aires, Argentina. Twenty priority research questions were subsequently identified. These research questions included developing, improving, and harmonizing across LA countries methods for 1) identifying contaminants and degradation products in complex matrices (including biota); 2) advancing prediction of contaminant risks and effects in ecosystems, addressing lab-to-field extrapolation challenges, and understanding complexities of multiple stressors (including chemicals and climate change); and 3) improving management and regulatory tools toward achieving sustainable development. Whereas environmental contaminants frequently identified in these key questions were pesticides, pharmaceuticals, endocrine disruptors or modulators, plastics, and nanomaterials, commonly identified environmental challenges were related to agriculture, urban effluents, solid wastes, pulp and paper mills, and natural extraction activities. Several interesting research topics included assessing and preventing pollution impacts on conservation protected areas, integrating environment and health assessments, and developing strategies for identification, substitution, and design of less hazardous chemicals (e.g., green chemistry). Finally, a recurrent research need included developing an understanding of differential sensitivity of regional species and ecosystems to environmental contaminants and other stressors. Addressing these critical questions will

  14. Achieving the Security, Environmental, and Economic Potential of Bioenergy. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Riggs, John A

    2006-06-07

    A group of business, government, environmental and academic leaders convened in a dialogue by the Aspen Institute proposed a series of actions to promote the widespread commercialization of both corn and cellulosic ethanol to improve energy security, the environment, and the economy. Co-chaired by Booz Allen Hamilton Vice President and former CIA Director R. James Woolsey and former Congressman Tom Ewing (R. IL), they developed a series of recommendations involving improved crop yields, processing of biomass into ethanol, manufacture of more cars that can burn either ethanol or gasoline, and the provision of ethanol pumps at more filling stations. Their report, "A High Growth Strategy for Ethanol, includes a discussion of the potential of ethanol, the group's recommendations, and a series of discussion papers commissioned for the dialogue.

  15. 76 FR 7881 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2011-02-11

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... support for environmental research and education. Agenda March 16 Update on recent NSF environmental... Science Foundation announces the following meeting: Name: Advisory Committee for Environmental Research...

  16. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  17. Environmental Quality Laboratory Research Report, 1985-1987

    OpenAIRE

    Brooks, Norman H.

    1988-01-01

    The Environmental Quality Laboratory at Caltech is a center for research on large-scale systems problems of natural resources and environmental quality. The principal areas of investigation at EQL are: 1. Air quality management. 2. Water resources and water quality management. 3. Control of hazardous substances in the environment. 4. Energy policy, including regulation, conservation and energy-environment tradeoffs. 5. Resources policy (other than energy); residuals m...

  18. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  19. Environmental research concept for the period 2000 - 2003

    International Nuclear Information System (INIS)

    2000-01-01

    This document published by the Swiss Agency for the Environment, Forests and Landscape (SAEFL) describes the concept for environmental research in Switzerland during the period 2000 - 2003. In a first part, the general state of environmental research is examined and the various public and private institutions involved are introduced. In the second part, the priorities for the period 2000 - 2003 are stated. The main points of focus, including the protection of the diversity of biological and landscape resources and their sustainable use, the protection of mankind and the environment from harmful substances and organisms, human behaviour, economical incentives and teaching systems, are discussed. Also, the targets of international agreements on environmental protection and the instruments to be used to implement them are examined. Finally, the report discusses the implementation of the declared research priorities and introduces the commission that is to watch over these activities. Figures are quoted on the funding necessary for the work and the importance of interdisciplinary and trans-disciplinary co-operation is stressed

  20. Nuclear methods in environmental and energy research

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, J R [ed.

    1980-01-01

    A total of 75 papers were presented on nuclear methods for analysis of environmental and biological samples. Sessions were devoted to software and mathematical methods; nuclear methods in atmospheric and water research; nuclear and atomic methodology; nuclear methods in biology and medicine; and nuclear methods in energy research.

  1. Nuclear methods in environmental and energy research

    International Nuclear Information System (INIS)

    Vogt, J.R.

    1980-01-01

    A total of 75 papers were presented on nuclear methods for analysis of environmental and biological samples. Sessions were devoted to software and mathematical methods; nuclear methods in atmospheric and water research; nuclear and atomic methodology; nuclear methods in biology and medicine; and nuclear methods in energy research

  2. The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research

    Directory of Open Access Journals (Sweden)

    Robin Luckham

    2013-09-01

    authority and capacity to deliver security are weak, disputed or compromised by special interests; and (iii “securitised policy spaces” in which international actors collaborate to ensure peace and fulfil their responsibility to protect vulnerable end-users in unsecured regions. In making these distinctions we argue that similar analytical lenses can be turned upon international actors in securitised policy spaces as well as upon state and non-state security actors. The concluding section argues that such a reframing of the security and development debate demands not just new modes of analysis but also fresh approaches to research designed both to provide insights into the vernacular understandings, coping strategies and potential agency of end-users and to uncover the informal networks, alliances and covert strategies of the multiple actors determining their security in hybrid political orders. This paper builds upon a systematic literature search undertaken by the Justice and Security Research Programme (JSRP at the London School of Economics (LSE funded by the UK’s Department for International Development (DFID. The search itself and its main findings are discussed in Luckham and Kirk (2012 and Luckham and Kirk (2013.

  3. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  4. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  5. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  6. Environmental Systems Research and Analysis FY 2000 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    David L. Miller; Castle, Peter Myer; Steven J. Piet

    2001-01-01

    The Environmental Systems Research (ESR) Program, a part of the Environmental Systems Research and Analysis (ESRA) Program, was implemented to enhance and augment the technical capabilities of the INEEL. Strengthening the Technical capabilities of the INEEL will provide the technical base to serve effectively as the Environmental Management Laboratory for the Office of Environmental Management (EM). This is a progress report for the third year of the ESR Program (FY 2000). A report of activities is presented for the five ESR research investment areas: (1) Transport Aspects of Selective Mass Transport Agents, (2) Chemistry of Environmental Surfaces, (3) Materials Dynamics, (4) Characterization Science, and (5) Computational Simulation of Mechanical and Chemical Systems. In addition to the five technical areas, the report describes activities in the Science and Technology Foundations element of the program, e.g., interfaces between ESR and the EM Science Program (EMSP) and the EM Focus Areas. The five research areas are subdivided into 18 research projects. FY 2000 research in these 18 projects has resulted in more than 50 technical papers that are in print, in press, in review, or in preparation. Additionally, more than 100 presentations were made at professional society meetings nationally and internationally. Work supported by this program was in part responsible for one of our researchers, Dr. Mason Harrup, receiving the Department of Energy’s “Bright Light” and “Energy at 23” awards. Significant accomplishments were achieved. Non-Destructive Assay hardware and software was deployed at the INEEL, enhancing the quality and efficiency of TRU waste characterization for shipment. The advanced tensiometer has been employed at numerous sites around the complex to determine hydrologic gradients in variably saturated vadose zones. An ion trap, secondary ion mass spectrometer (IT-SIMS) was designed and fabricated to deploy at the INEEL site to measure the

  7. Current developments in environmental psychology : topics and researchers

    NARCIS (Netherlands)

    van der Werff, Ellen; Perlaviciute, Goda; Muinos, Gabriel

    2016-01-01

    The aim of this special issue is to bring the work of early-career researchers in environmental psychology to the spotlight. These young researchers come from different countries and cultures, have their own theoretical approaches and employ different research methods to increase knowledge on the

  8. Bechtel Hanford, Inc. Network Security Plan for the Environmental Restoration Contract

    International Nuclear Information System (INIS)

    Slade, B.E.

    2000-01-01

    This document was created to address ERC computer security needs that are outlined by DOE Order 1360.2B, Unclassified Computer Security Program. DOE Order 1360.2B has been canceled and replaced with DOE Notice 205.1, Unclassified Cyber Security Program. The ERC response to DOE Notice 205.1 is to generate BHI-01343, Cyber Security Program Plan, which is not available for public access or viewing

  9. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    Directory of Open Access Journals (Sweden)

    Han-Shen Chen

    2017-01-01

    Full Text Available In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs, meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI, with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  10. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-01

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level. PMID:28146086

  11. Research on environmental impact of water-based fire extinguishing agents

    Science.gov (United States)

    Wang, Shuai

    2018-02-01

    This paper offers current status of application of water-based fire extinguishing agents, the environmental and research considerations of the need for the study of toxicity research. This paper also offers systematic review of test methods of toxicity and environmental impact of water-based fire extinguishing agents currently available, illustrate the main requirements and relevant test methods, and offer some research findings for future research considerations. The paper also offers limitations of current study.

  12. Environmental Research Division technical progress report, January 1984-December 1985

    International Nuclear Information System (INIS)

    1986-05-01

    Technical progress in the various research and assessment activities of Argonne National Laboratory's Environmental Research Division is reported for the period 1984 to 1985. Textual, graphic, and tabular information is used to briefly summarize (in separate chapters) the work of the Division's Atmospheric Physics, Environmental Effects Research, Environmental Impacts, Fundamental Molecular Physics and Chemistry, and Waste Management Programs. Information on professional qualifications, awards, and outstanding professional activities of staff members, as well as lists of publications, oral presentations, special events organized, and participants in educational programs, are provided in appendices at the end of each chapter

  13. Environmental Research Division technical progress report, January 1984-December 1985

    Energy Technology Data Exchange (ETDEWEB)

    1986-05-01

    Technical progress in the various research and assessment activities of Argonne National Laboratory's Environmental Research Division is reported for the period 1984 to 1985. Textual, graphic, and tabular information is used to briefly summarize (in separate chapters) the work of the Division's Atmospheric Physics, Environmental Effects Research, Environmental Impacts, Fundamental Molecular Physics and Chemistry, and Waste Management Programs. Information on professional qualifications, awards, and outstanding professional activities of staff members, as well as lists of publications, oral presentations, special events organized, and participants in educational programs, are provided in appendices at the end of each chapter.

  14. Environmental Sciences Division: Summaries of research in FY 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-01

    This report focuses on research in global change, as well as environmental remediation. Global change research investigates the following: distribution and balance of radiative heat energy; identification of the sources and sinks of greenhouse gases; and prediction of changes in the climate and concomitant ecological effects. Environmental remediation develops the basic understanding needed to remediate soils, sediments, and ground water that have undergone radioactive and chemical contamination.

  15. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  16. An extension of consumer environmental behavior research among expatriates

    OpenAIRE

    Bhuian, Shahid N.; Amyx, Douglas A.; Shamma, Hamad M.

    2014-01-01

    A wealth of research has explored different configurations of consumer environmental beliefs, attitudes, and values, and their influence on consumer environmental behavior. It is essential that a more comprehensive understanding of what lies at the root of consumer environmental beliefs, attitudes, values, and behaviors be developed. This study aims to address some of the limitations in the current literature by theorizing and examining a consumer environmental behavior model that includes th...

  17. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  18. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  19. Jupiter Environmental Research & Field Studies Academy.

    Science.gov (United States)

    Huttemeyer, Bob

    1996-01-01

    Describes the development and workings of the Jupiter Environmental Research and Field Studies Academy that focuses on enabling both teachers and students to participate in real-life learning experiences. Discusses qualifications for admittance, curriculum, location, ongoing projects, students, academics, preparation for life, problem solving, and…

  20. Towards a joint approach for access to environmental research infrastructures

    Science.gov (United States)

    Mann, Ingrid; Tjulin, Anders; Pappalardo, Gelsomina; Gagliardi, Simone; Philippin, Sabine; Sellegri, Karine; Chabbi, Abad

    2016-04-01

    Geoscience is a multi-disciplinary field and in many cases its research benefits from considering different kinds of observational results. Geoscience observations are in some cases of direct interest also to the public. For these reasons effective knowledge transfer and access also across disciplines are especially important for research infrastructures (RIs) in the environmental domain. More generally, the ultimate success of a RI is measured by its scientific outcome and this is best achieved based on efficient access for a broad scientific community. In this presentation the authors report activities to develop governance tools so that the access to environmental RIs and to the data that they provide is common, fair and based on scientific rationale, regarding at the same time economically and technically reasonable use of limited resources. Implementing such governance tools will indeed foster and widen the access to RIs across environmental science domains while addressing societal challenges. The strategies also need to be flexible and sustainable over the expected lifetimes of the RIs. The reported activities involve researchers from different projects and environmental subdomains that come together in the project ENVRI_plus. ENVRI_plus is a Cluster project of RIs that brings together the current ESFRI roadmap RIs in the environmental domain and other relevant existing and developing RIs and projects. ENVRI_plus also offers opportunities for free-of-charge transnational access to four multi-disciplinary research platforms. These calls for access target research groups and companies wishing to conduct research or to test instruments for cross-disciplinary topics within the environmental domains atmosphere, biosphere, marine, and solid earth. They are initiated specifically to gain experience with access across different disciplines (further information is given at www.envriplus.eu). ENVRI_plus receives funding from the European Union's Horizon 2020 research

  1. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  2. Health and Environmental Research: summary of accomplishments. Volume 2

    International Nuclear Information System (INIS)

    1986-08-01

    This is an account of some of the accomplishments of the health and environmental research program performed in national laboratories, universities, and research institutes. Both direct and indirect societal benefits emerged from the new knowledge provided by the health and environmental research program. In many cases, the private sector took this knowledge and applied it well beyond the mission of supporting the defense and energy needs of the Nation. Industrial and medical applications, for example, have in several instances provided annual savings to society of $100 million or more. The form of this presentation is, in fact, through ''snapshots'' - examples of significant, tangible accomplishments in each of the areas at certain times to illustrate the role and impact of the research program. The program's worth is not necessarily confined to such accomplishments; it extends, rather, to its ability to identify and help solve potential health and environmental problems before they become critical. This anticipatory mission has been pursued with an approach that combines applied problem solving with a commitment to fundamental research that is long-term and high-risk. The narrative of this research program concludes with a perspective of its past and a prospectus on its future

  3. NS [Nuclear Safety] update. Current safety and security activities and developments taking place in the Department of Nuclear Safety and Security, Issue no. 10, March 2009

    International Nuclear Information System (INIS)

    2009-03-01

    The current issue contains information about the following meetings: Application of the Code of Conduct on the Safety of Research Reactors (the 'Code'). Environmental Modelling for Radiation Safety (EMRAS II); Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management (the Joint Convention). The document also gives an overview on International Nuclear Security Advisory Service (INSServ)

  4. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  5. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    Full Text Available Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  6. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Science.gov (United States)

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  7. Environmental Research Division technical progress report: January 1986--October 1987

    International Nuclear Information System (INIS)

    1988-07-01

    Technical process in the various research activities of Argonne National Laboratory's Environmental Research Division is reported for the period 1986-1987. Textual, graphic, and tabular information is used to briefly summarize (in separate chapters) the work of the Division's Atmospheric Physics, Environmental Effects Research, Fundamental Molecular Physics and Chemistry, and Organic Geochemistry and Environmental Instrumentation Programs. Information on professional qualifications, awards, and outstanding professional activities of staff members, as well as lists of publications, oral presentations, special events organized, and participants in educational programs, are provided in appendices at the end of each chapter. Individual projects under each division are processed separately for the data bases

  8. Environmental Research Division technical progress report: January 1986--October 1987

    Energy Technology Data Exchange (ETDEWEB)

    1988-07-01

    Technical process in the various research activities of Argonne National Laboratory's Environmental Research Division is reported for the period 1986-1987. Textual, graphic, and tabular information is used to briefly summarize (in separate chapters) the work of the Division's Atmospheric Physics, Environmental Effects Research, Fundamental Molecular Physics and Chemistry, and Organic Geochemistry and Environmental Instrumentation Programs. Information on professional qualifications, awards, and outstanding professional activities of staff members, as well as lists of publications, oral presentations, special events organized, and participants in educational programs, are provided in appendices at the end of each chapter. Individual projects under each division are processed separately for the data bases.

  9. Information Security Risk Assessment in Hospitals.

    Science.gov (United States)

    Ayatollahi, Haleh; Shagerdi, Ghazal

    2017-01-01

    To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.

  10. Environmental research programme. Ecological research. Annual report 1994. Urban-industrial landscapes, forests, agricultural landscapes, river and lake landscapes, terrestrial ecosystem research, environmental pollution and health

    International Nuclear Information System (INIS)

    1995-01-01

    In the annual report 1994 of the Federal Ministry of Research and Technology, the points of emphasis of the ecological research programme and their financing are discussed. The individual projects in the following subject areas are described in detail: urban-industrial landscapes, forests, agricultural landscapes, river and lake landscapes, other ecosystems and landscapes, terrestrial ecosystem research, environmental pollution and human health and cross-sectional activities in ecological research. (vhe) [de

  11. Assessing the benefits of OHER (Office of Health and Environmental Research) research: Three case studies

    Energy Technology Data Exchange (ETDEWEB)

    Nesse, R.J.; Callaway, J.M.; Englin, J.E.; Klan, M.S.; Nicholls, A.K.; Serot, D.E.

    1987-09-01

    This research was undertaken to estimate the societal benefits and costs of selected past research performed for the Office of Health and Environmental Research (OHER) of the US Department of Energy (DOE). Three case studies of representative OHER and DOE research were performed. One of these, the acid rain case study, includes research conducted elsewhere in DOE. The other two cases were the OHER marine research program and the development of high-purity germanium that is used in radiation detectors. The acid rain case study looked at the research benefits and costs of furnace sorbent injection and duct injection, technologies that might reduce acid deposition precursors. Both appear to show benefits in excess of costs. We examined in detail one of the OHER marine research program's accomplishments - the increase in environmental information used by the Outer Continental Shelf leasing program to manage bidding for off-shore oil drilling. The results of an econometric model show that environmental information of the type supported by OHER is unequivocally linked to government and industry leasing decisions. The germanium case study indicated that the benefits of germanium radiation detectors were significant.

  12. China’s oil security from the supply chain perspective: A review

    International Nuclear Information System (INIS)

    Zhao, Chunfu; Chen, Bin

    2014-01-01

    Highlights: • The development phase of China’s oil industry is detailed. • Risk to oil industry in China is identified along the supply chain. • Policy aimed at improving oil security is examined. - Abstract: Oil security has become a major issue in China. This paper analyzes China’s oil security from the supply chain perspective, as the country faces challenges from an increasing reliance on imported oil, a fast-growing economy, the Malacca dilemma, and volatile international oil prices. To clarify the issue of oil security, we first review the development phase of China’s oil industry and previous research related to its energy security. Then a framework from the supply chain perspective is constructed to identify the current risk from three aspects: energy flow, financial and environmental. Finally, policies aimed at improving the country’s energy security are examined and potential problems presented. From this analysis, we conclude that the potential risk arising from China’s oil system is inherently interconnected. There is still great potential for the country to improve oil security by strengthening its strategic oil reserves, improving energy efficiency, and developing its domestic oil tanker fleet

  13. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  14. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  15. Energy security and the IEA ExCo on combustion

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, P. [Hutchinson Consultant (United Kingdom)

    2009-07-01

    Energy security is an issue for those nations which consume more energy than is available from indigenous sources. A failure to secure adequate energy supplies at an acceptable price prejudices both national and economic security. Energy security is therefore a significant policy issue. A discussion of energy security and the International Energy Agency ExCo on combustion was offered in this presentation. The purpose of the discussion was to determine if a task or set of tasks on combustion research related to energy security should be launched; the structure of such a task; topics of interest; who would wish to participate; who would lead the collaboration; and the next steps. The presentation discussed the proper understanding and analysis of energy security and the interactions between international politics; defence; economics and economic development; present and future technologies; national infrastructure; resource distribution; and environmental science and politics. The presentation also discussed whether there was a shortage of energy, world reserves of crude oil, coal, and hydrocarbons. Oil supply disruptions and nominal and real world oil prices were also discussed. Options for addressing energy security were presented, with particular reference to increasing the energy intensity of the economy; using a wide range of different fuels such as coal; developing indigenous supplies such as renewables; and developing a reliable long life energy source. It was concluded that imports of energy can be reduced when energy security improves. tabs., figs.

  16. Toward sustainable environmental quality: Identifying priority research questions for Latin America

    Science.gov (United States)

    Furley, Tatiana Heid; Brodeur, Julie; Silva de Assis, Helena C; Carriquiriborde, Pedro; Chagas, Katia R; Corrales, Jone; Denadai, Marina; Fuchs, Julio; Mascarenhas, Renata; Miglioranza, Karina SB; Miguez Caramés, Diana Margarita; Navas, José Maria; Nugegoda, Dayanthi; Planes, Estela; Rodriguez‐Jorquera, Ignacio Alejandro; Orozco‐Medina, Martha; Boxall, Alistair BA; Rudd, Murray A

    2018-01-01

    ABSTRACT The Global Horizon Scanning Project (GHSP) is an innovative initiative that aims to identify important global environmental quality research needs. Here we report 20 key research questions from Latin America (LA). Members of the Society of Environmental Toxicology and Chemistry (SETAC) LA and other scientists from LA were asked to submit research questions that would represent priority needs to address in the region. One hundred questions were received, then partitioned among categories, examined, and some rearranged during a workshop in Buenos Aires, Argentina. Twenty priority research questions were subsequently identified. These research questions included developing, improving, and harmonizing across LA countries methods for 1) identifying contaminants and degradation products in complex matrices (including biota); 2) advancing prediction of contaminant risks and effects in ecosystems, addressing lab‐to‐field extrapolation challenges, and understanding complexities of multiple stressors (including chemicals and climate change); and 3) improving management and regulatory tools toward achieving sustainable development. Whereas environmental contaminants frequently identified in these key questions were pesticides, pharmaceuticals, endocrine disruptors or modulators, plastics, and nanomaterials, commonly identified environmental challenges were related to agriculture, urban effluents, solid wastes, pulp and paper mills, and natural extraction activities. Several interesting research topics included assessing and preventing pollution impacts on conservation protected areas, integrating environment and health assessments, and developing strategies for identification, substitution, and design of less hazardous chemicals (e.g., green chemistry). Finally, a recurrent research need included developing an understanding of differential sensitivity of regional species and ecosystems to environmental contaminants and other stressors. Addressing these critical

  17. 75 FR 50009 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2010-08-16

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... support for environmental research and education. Agenda September 8, 2010 Update on recent NSF... Science Foundation announces the following meeting: Name: Advisory Committee for Environmental Research...

  18. Multi-Contextual Segregation and Environmental Justice Research: Toward Fine-Scale Spatiotemporal Approaches.

    Science.gov (United States)

    Park, Yoo Min; Kwan, Mei-Po

    2017-10-10

    Many environmental justice studies have sought to examine the effect of residential segregation on unequal exposure to environmental factors among different social groups, but little is known about how segregation in non-residential contexts affects such disparity. Based on a review of the relevant literature, this paper discusses the limitations of traditional residence-based approaches in examining the association between socioeconomic or racial/ethnic segregation and unequal environmental exposure in environmental justice research. It emphasizes that future research needs to go beyond residential segregation by considering the full spectrum of segregation experienced by people in various geographic and temporal contexts of everyday life. Along with this comprehensive understanding of segregation, the paper also highlights the importance of assessing environmental exposure at a high spatiotemporal resolution in environmental justice research. The successful integration of a comprehensive concept of segregation, high-resolution data and fine-grained spatiotemporal approaches to assessing segregation and environmental exposure would provide more nuanced and robust findings on the associations between segregation and disparities in environmental exposure and their health impacts. Moreover, it would also contribute to significantly expanding the scope of environmental justice research.

  19. Multi-Contextual Segregation and Environmental Justice Research: Toward Fine-Scale Spatiotemporal Approaches

    Directory of Open Access Journals (Sweden)

    Yoo Min Park

    2017-10-01

    Full Text Available Many environmental justice studies have sought to examine the effect of residential segregation on unequal exposure to environmental factors among different social groups, but little is known about how segregation in non-residential contexts affects such disparity. Based on a review of the relevant literature, this paper discusses the limitations of traditional residence-based approaches in examining the association between socioeconomic or racial/ethnic segregation and unequal environmental exposure in environmental justice research. It emphasizes that future research needs to go beyond residential segregation by considering the full spectrum of segregation experienced by people in various geographic and temporal contexts of everyday life. Along with this comprehensive understanding of segregation, the paper also highlights the importance of assessing environmental exposure at a high spatiotemporal resolution in environmental justice research. The successful integration of a comprehensive concept of segregation, high-resolution data and fine-grained spatiotemporal approaches to assessing segregation and environmental exposure would provide more nuanced and robust findings on the associations between segregation and disparities in environmental exposure and their health impacts. Moreover, it would also contribute to significantly expanding the scope of environmental justice research.

  20. Training and Mentoring the Next Generation of Scientists and Engineers to Secure Continuity and Successes of the US DOE's Environmental Remediation Efforts - 13387

    International Nuclear Information System (INIS)

    Lagos, L.

    2013-01-01

    participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)

  1. 76 FR 47611 - Advisory Committee for Environmental Research And Education; Notice of Meeting

    Science.gov (United States)

    2011-08-05

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research And Education; Notice of... support for environmental research and education. Agenda September 8, 2011 Update on NSF environmental research and education activities; Update on national and international collaborations; Meeting with the...

  2. 78 FR 9743 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2013-02-11

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... concerning support for environmental research and education. Agenda March 13, 2013 Update on NSF environmental research and education activities Update on national and international collaborations Update on...

  3. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  4. Qualitative environmental health research: an analysis of the literature, 1991-2008.

    Science.gov (United States)

    Scammell, Madeleine Kangsen

    2011-10-01

    Qualitative research uses nonnumeric data to understand people's opinions, motives, understanding, and beliefs about events or phenomena. In this analysis, I report the use of qualitative methods and data in the study of the relationship between environmental exposures and human health. A primary search for peer-reviewed journal articles dated from 1991 through 2008 included the following three terms: qualitative, environ*, and health. Searches resulted in 3,155 records. Data were extracted and findings of articles analyzed to determine where and by whom qualitative environmental health research is conducted and published, the types of methods and analyses used in qualitative studies of environmental health, and the types of information qualitative data contribute to environmental health. The results highlight a diversity of disciplines and techniques among researchers who used qualitative methods to study environmental health. Nearly all of the studies identified increased scientific understanding of lay perceptions of environmental health exposures. This analysis demonstrates the potential of qualitative data to improve understanding of complex exposure pathways, including the influence of social factors on environmental health, and health outcomes.

  5. Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2012-01-01

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  6. Environmental Research Division's Data Access Program (ERDDAP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — ERDDAP (the Environmental Research Division's Data Access Program) is a data server that gives you a simple, consistent way to download subsets of scientific...

  7. 2014 Oak Ridge Reservation Annual Site Environmental Report

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Joan F. [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    The US Department of Energy’s (DOE’s) Oak Ridge Reservation (ORR) is located in Roane and Anderson counties in East Tennessee, about 40 km (25 miles) from Knoxville. ORR is one of DOE’s most unique and complex sites. It encompasses three major facilities and thousands of employees that perform every mission in the DOE portfolio—energy research, environmental restoration, national security, nuclear fuel supply, reindustrialization, science education, basic and applied research in areas important to US security, and technology transfer. ORR was established in the early 1940s as part of the Manhattan Project for the purposes of enriching uranium and pioneering methods for producing and separating plutonium. Today, scientists at the Oak Ridge National Laboratory (ORNL), DOE’s largest multipurpose national laboratory, conduct world-leading research in advanced materials, alternative fuels, climate change, and supercomputing. The Y-12 National Security Complex (Y-12 or Y-12 Complex) is vital to maintaining the safety, security, and effectiveness of the US nuclear weapons stockpile and reducing the global threat posed by nuclear proliferation and terrorism. The East Tennessee Technology Park (ETTP), a former uranium enrichment complex, is being transitioned to a clean, revitalized industrial park.

  8. A facility for using cluster research to study environmental problems

    International Nuclear Information System (INIS)

    1991-11-01

    This report begins by describing the general application of cluster based research to environmental chemistry and the development of a Cluster Structure and Dynamics Research Facility (CSDRF). Next, four important areas of cluster research are described in more detail, including how they can impact environmental problems. These are: surface-supported clusters, water and contaminant interactions, time-resolved dynamic studies in clusters, and cluster structures and reactions. These facilities and equipment required for each area of research are then presented. The appendices contain workshop agenda and a listing of the researchers who participated in the workshop discussions that led to this report

  9. A facility for using cluster research to study environmental problems

    Energy Technology Data Exchange (ETDEWEB)

    1991-11-01

    This report begins by describing the general application of cluster based research to environmental chemistry and the development of a Cluster Structure and Dynamics Research Facility (CSDRF). Next, four important areas of cluster research are described in more detail, including how they can impact environmental problems. These are: surface-supported clusters, water and contaminant interactions, time-resolved dynamic studies in clusters, and cluster structures and reactions. These facilities and equipment required for each area of research are then presented. The appendices contain workshop agenda and a listing of the researchers who participated in the workshop discussions that led to this report.

  10. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  11. Health and Environmental Research: summary of accomplishments. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1986-08-01

    This is an account of some of the accomplishments of the health and environmental research program performed in national laboratories, universities, and research institutes. Both direct and indirect societal benefits emerged from the new knowledge provided by the health and environmental research program. In many cases, the private sector took this knowledge and applied it well beyond the mission of supporting the defense and energy needs of the Nation. Industrial and medical applications, for example, have in several instances provided annual savings to society of $100 million or more. The form of this presentation is, in fact, through ''snapshots'' - examples of significant, tangible accomplishments in each of the areas at certain times to illustrate the role and impact of the research program. The program's worth is not necessarily confined to such accomplishments; it extends, rather, to its ability to identify and help solve potential health and environmental problems before they become critical. This anticipatory mission has been pursued with an approach that combines applied problem solving with a commitment to fundamental research that is long-term and high-risk. The narrative of this research program concludes with a perspective of its past and a prospectus on its future.

  12. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  13. SOCIAL CAPITAL AS THE BASIS FOR THE FORMATION OF SOCIO-ECONOMIC SECURITY IN RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Andrii Sukhostavets

    2017-09-01

    Full Text Available Social capital is the basis for the definition of the future concept of rural areas management. Therefore, one of the most important tasks is to determine the various factors of existence, development, and formation of social capital. One of these factors is the security of rural areas and the definition of how social capital affects it. The analysis of the available scientific works in various areas reveals the lack of consensus in the definition of the category “socio-economic security of rural areas”. This is due to the fact that the definition of social and economic security of rural areas is identified with such concepts as the ability to provide resistance to various internal and external environmental influences. The purpose of the study is to determine the nature of social capital, as well as to study its impact on the socio-economic security of the state. The methodology of the research is based on the monographic method, the method of dialectic cognition, the scenario methods used to find the optimal scenario implementation option; SWOT-analysis is used to assess the positive or negative impact of social capital on the socio-economic security of rural areas. Understanding the essence of socio-economic security has led to the conclusion that it consists of economic, social, environmental and other types of security. The term “social security” in the understanding of researchers usually has two interpretations: traditional (absence of threats to the society and alternative (absence of threats from the society. It is proved that the social security of the region should be focused on ensuring primarily human rights and freedoms, namely, personal, political, social, economic, cultural, environmental, and family ones. Social and economic security should also provide social standards and guarantees, as well as norms. The economic basis of the security of rural areas is manifested in the development of market relations, infrastructure

  14. Tennessee Valley Authority National Fertilizer and Environmental Research Center

    International Nuclear Information System (INIS)

    Gautney, J.

    1991-01-01

    The National Fertilizer and Environmental Research Center (NFERC) is a unique part of the Tennessee Valley Authority (TVA), a government agency created by an Act of Congress in 1933. The Center, located in Muscle Shoals, Alabama, is a national laboratory for research, development, education and commercialization for fertilizers and related agricultural chemicals including their economic and environmentally safe use, renewable fuel and chemical technologies, alternatives for solving environmental/waste problems, and technologies which support national defense- NFERC projects in the pesticide waste minimization/treatment/disposal areas include ''Model Site Demonstrations and Site Assessments,'' ''Development of Waste Treatment and Site Remediation Technologies for Fertilizer/Agrichemical Dealers,'' ''Development of a Dealer Information/Education Program,'' and ''Constructed Wetlands.''

  15. Research Experience for Undergraduates Program in Multidisciplinary Environmental Science

    Science.gov (United States)

    Wu, M. S.

    2012-12-01

    During summers 2011 and 12 Montclair State University hosted a Research Experience for Undergraduates Program (REU) in transdisciplinary, hands-on, field-oriented research in environmental sciences. Participants were housed at the Montclair State University's field station situated in the middle of 30,000 acres of mature forest, mountain ridges and freshwater streams and lakes within the Kittatinny Mountains of Northwest New Jersey, Program emphases were placed on development of project planning skills, analytical skills, creativity, critical thinking and scientific report preparation. Ten students were recruited in spring with special focus on recruiting students from underrepresented groups and community colleges. Students were matched with their individual research interests including hydrology, erosion and sedimentation, environmental chemistry, and ecology. In addition to research activities, lectures, educational and recreational field trips, and discussion on environmental ethics and social justice played an important part of the program. The ultimate goal of the program is to facilitate participants' professional growth and to stimulate the participants' interests in pursuing Earth Science as the future career of the participants.

  16. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  17. Environmental assessment of the Carlsbad Environmental Monitoring and Research Center Facility

    International Nuclear Information System (INIS)

    1995-10-01

    This Environmental Assessment has been prepared to determine if the Carlsbad Environmental Monitoring and Research Center (the Center), or its alternatives would have significant environmental impacts that must be analyzed in an Environmental Impact Statement. DOE's proposed action is to continue funding the Center. While DOE is not funding construction of the planned Center facility, operation of that facility is dependent upon continued funding. To implement the proposed action, the Center would initially construct a facility of approximately 2,300 square meters (25,000 square feet). The Phase 1 laboratory facilities and parking lot will occupy approximately 1.2 hectares (3 acres) of approximately 8.9 hectares (22 acres) of land which were donated to New Mexico State University (NMSU) for this purpose. The facility would contain laboratories to analyze chemical and radioactive materials typical of potential contaminants that could occur in the environment in the vicinity of the DOE Waste Isolation Pilot Plant (WIPP) site or other locations. The facility also would have bioassay facilities to measure radionuclide levels in the general population and in employees of the WIPP. Operation of the Center would meet the DOE requirement for independent monitoring and assessment of environmental impacts associated with the planned disposal of transuranic waste at the WIPP

  18. Environmental assessment of the Carlsbad Environmental Monitoring and Research Center Facility

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    This Environmental Assessment has been prepared to determine if the Carlsbad Environmental Monitoring and Research Center (the Center), or its alternatives would have significant environmental impacts that must be analyzed in an Environmental Impact Statement. DOE`s proposed action is to continue funding the Center. While DOE is not funding construction of the planned Center facility, operation of that facility is dependent upon continued funding. To implement the proposed action, the Center would initially construct a facility of approximately 2,300 square meters (25,000 square feet). The Phase 1 laboratory facilities and parking lot will occupy approximately 1.2 hectares (3 acres) of approximately 8.9 hectares (22 acres) of land which were donated to New Mexico State University (NMSU) for this purpose. The facility would contain laboratories to analyze chemical and radioactive materials typical of potential contaminants that could occur in the environment in the vicinity of the DOE Waste Isolation Pilot Plant (WIPP) site or other locations. The facility also would have bioassay facilities to measure radionuclide levels in the general population and in employees of the WIPP. Operation of the Center would meet the DOE requirement for independent monitoring and assessment of environmental impacts associated with the planned disposal of transuranic waste at the WIPP.

  19. 77 FR 50532 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2012-08-21

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... Environmental Research and Education, 9487. Dates: September 12, 2012, 9 a.m.-5 p.m. September 13, 2012, 9 a.m... concerning support for environmental research and education. Agenda September 12, 2012 Update on NSF...

  20. European environmental research infrastructures are going for common 30 years strategy

    Science.gov (United States)

    Asmi, Ari; Konjin, Jacco; Pursula, Antti

    2014-05-01

    Environmental Research infrastructures are facilities, resources, systems and related services that are used by research communities to conduct top-level research. Environmental research is addressing processes at very different time scales, and supporting research infrastructures must be designed as long-term facilities in order to meet the requirements of continuous environmental observation, measurement and analysis. This longevity makes the environmental research infrastructures ideal structures to support the long-term development in environmental sciences. ENVRI project is a collaborative action of the major European (ESFRI) Environmental Research Infrastructures working towards increased co-operation and interoperability between the infrastructures. One of the key products of the ENVRI project is to combine the long-term plans of the individual infrastructures towards a common strategy, describing the vision and planned actions. The envisaged vision for environmental research infrastructures toward 2030 is to support the holistic understanding of our planet and it's behavior. The development of a 'Standard Model of the Planet' is a common ambition, a challenge to define an environmental standard model; a framework of all interactions within the Earth System, from solid earth to near space. Indeed scientists feel challenged to contribute to a 'Standard Model of the Planet' with data, models, algorithms and discoveries. Understanding the Earth System as an interlinked system requires a systems approach. The Environmental Sciences are rapidly moving to become a one system-level science. Mainly since modern science, engineering and society are increasingly facing complex problems that can only be understood in the context of the full overall system. The strategy of the supporting collaborating research infrastructures is based on developing three key factors for the Environmental Sciences: the technological, the cultural and the human capital. The technological

  1. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  2. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  3. Workshop on environmental research for actinide elements

    International Nuclear Information System (INIS)

    Watters, R.L.

    1981-09-01

    The discussions in this fifth workshop were directed to the advances which have been made in the environmental chemistry of plutonium and to the feasibility and worth of developing environmental transport models which might serve as predictive tools for long term behavior and as guides for future research needs. Two plutonium models of the soil/plant pathway were presented for critique and as examples of possible approaches. Reports of the following four panels are presented in this proceedings: model development; marine; terrestrial and freshwater/groundwater

  4. Land and water resources for environmental research on Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Dahlman, R.C.; Kitchings, J.T.; Elwood, J.W.

    1977-01-01

    Resources for environmental research on the Oak Ridge Reservation are analogous to the highly complex, physical and engineering facilities of the Oak Ridge National Laboratory. Consequently, land and water resources have been committed to comprehensive research for the purpose of providing relevant, scientific insights on environmental problems associated with ERDA's programs. Diverse aquatic, terrestrial, and agricultural ecosystems are designated for short- and long-term research related to environmental impacts or benefits of different energy technologies. Examples of ecosystems employed in this research include hardwood and pine forests, grasslands and pastures, free-flowing streams and impounded reservoirs, field plots, contaminated environmental natural areas, an array of animal habitats, and calibrated watersheds. Some of the characteristic biota of habitat ecosystems are described in the document. Documentation and planning for use of these lands, waters, and biotic resources also respond to the broad issue of appropriate usage of Federal lands

  5. Land and water resources for environmental research on Oak Ridge Reservation

    Energy Technology Data Exchange (ETDEWEB)

    Dahlman, R.C.; Kitchings, J.T.; Elwood, J.W.

    1977-01-01

    Resources for environmental research on the Oak Ridge Reservation are analogous to the highly complex, physical and engineering facilities of the Oak Ridge National Laboratory. Consequently, land and water resources have been committed to comprehensive research for the purpose of providing relevant, scientific insights on environmental problems associated with ERDA's programs. Diverse aquatic, terrestrial, and agricultural ecosystems are designated for short- and long-term research related to environmental impacts or benefits of different energy technologies. Examples of ecosystems employed in this research include hardwood and pine forests, grasslands and pastures, free-flowing streams and impounded reservoirs, field plots, contaminated environmental natural areas, an array of animal habitats, and calibrated watersheds. Some of the characteristic biota of habitat ecosystems are described in the document. Documentation and planning for use of these lands, waters, and biotic resources also respond to the broad issue of appropriate usage of Federal lands.

  6. SECURE nuclear district heating plant

    International Nuclear Information System (INIS)

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  7. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  8. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  9. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  10. Evaluation of strategic research programs: The case of Danish environmental research 1993-2002

    DEFF Research Database (Denmark)

    Ingwersen, Peter Emil Rerup; Larsen, Birger

    2007-01-01

    The article reports on the mid-term and final scientometric evaluations of the Danish Strategic Environmental Research Program (SMP), which consisted of 13 virtual research centers from 1993 to 1997, nine of which are studied bibliometrically here. Citations are measured from 1993 to 2002. Central...

  11. [Integration of sex/gender into environmental health research. Results of the interdisciplinary research network Sex/Gender-Environment-Health (GeUmGe-NET)].

    Science.gov (United States)

    Bolte, Gabriele; David, Madlen; Dębiak, Małgorzata; Fiedel, Lotta; Hornberg, Claudia; Kolossa-Gehring, Marike; Kraus, Ute; Lätzsch, Rebecca; Paeck, Tatjana; Palm, Kerstin; Schneider, Alexandra

    2018-06-01

    The comprehensive consideration of sex/gender in health research is essential to increase relevance and validity of research results. Contrary to other areas of health research, there is no systematic summary of the current state of research on the significance of sex/gender in environmental health. Within the interdisciplinary research network Sex/Gender-Environment-Health (GeUmGe-NET) the current state of integration of sex/gender aspects or, respectively, gender theoretical concepts into research was systematically assessed within selected topics of the research areas environmental toxicology, environmental medicine, environmental epidemiology and public health research on environment and health. Knowledge gaps and research needs were identified in all research areas. Furthermore, the potential for methodological advancements by using gender theoretical concepts was depicted. A dialogue between biomedical research, public health research, and gender studies was started with the research network GeUmGe-NET. This dialogue has to be continued particularly regarding a common testing of methodological innovations in data collection and data analysis. Insights of this interdisciplinary research are relevant for practice areas such as environmental health protection, health promotion, environmental justice, and environmental health monitoring.

  12. Environmental research programme for Switzerland in the period 2000-2003

    International Nuclear Information System (INIS)

    1999-03-01

    This is the Environmental Research Programme for Switzerland worked out by the Swiss Agency for the Environment, Forestry and Landscape. The document reviews the present status with emphasis on the current main projects, the institutions involved, the financing available for them and the organisations and institutions in charge of research coordination and controlling. In a second part, the report defines the goals for the period 2000-2003. In particular, more interdisciplinary projects shall be conducted in co-operation with human sciences and future potential users of the research results, so that their introduction into practice is accelerated. The subjects to be dealt with regard both the global environmental destructions and the current acute issues for Switzerland. There are four topics of high priority: (i) conservation and sustainable usage of the biological and landscape diversity; (ii) mankind and environment protection from pollutants and dangerous organisms; (iii) human behaviours, economical incentives and education systems; (iv) the objectives of international agreements on environmental issues and the instruments they need to be applied. The authors assume that public support for environmental research in Switzerland will be around 850 millions USD for the four-years period considered in this document

  13. Environmental research programme for Switzerland in the period 2000-2003

    International Nuclear Information System (INIS)

    1999-03-01

    This is the Environmental Research Programme for Switzerland worked out by the Swiss Agency for the Environment, Forestry and Landscape. The document reviews the present status with emphasis on the current main projects, the institutions involved, the financing available for them and the organisations and institutions in charge of research coordination and controlling. In a second part, the report defines the goals for the period 2000-2003. In particular, more interdisciplinary projects shall be conducted in co-operation with human sciences and future potential users of the research results, so that their introduction into practice is accelerated. The subjects to be dealt with regard both the global environmental destructions and the current acute issues for Switzerland. There are four topics of high priority: (i) conservation and sustainable usage of the biological and landscape diversity; (ii) mankind and environment protection from pollutants and dangerous organisms; (iii) human behaviours, economical incentives and education systems; (iv) the objectives of international agreements on environmental issues and the instruments they need to be applied. The authors assume that public support for environmental research in Switzerland will be around 850 millions USD for the four-years period considered in this document [fr

  14. Mobile Sensing in Environmental Health and Neighborhood Research.

    Science.gov (United States)

    Chaix, Basile

    2018-04-01

    Public health research has witnessed a rapid development in the use of location, environmental, behavioral, and biophysical sensors that provide high-resolution objective time-stamped data. This burgeoning field is stimulated by the development of novel multisensor devices that collect data for an increasing number of channels and algorithms that predict relevant dimensions from one or several data channels. Global positioning system (GPS) tracking, which enables geographic momentary assessment, permits researchers to assess multiplace personal exposure areas and the algorithm-based identification of trips and places visited, eventually validated and complemented using a GPS-based mobility survey. These methods open a new space-time perspective that considers the full dynamic of residential and nonresidential momentary exposures; spatially and temporally disaggregates the behavioral and health outcomes, thus replacing them in their immediate environmental context; investigates complex time sequences; explores the interplay among individual, environmental, and situational predictors; performs life-segment analyses considering infraindividual statistical units using case-crossover models; and derives recommendations for just-in-time interventions.

  15. A Dual Perspective on Risks and Security Within Research Assistantships

    Directory of Open Access Journals (Sweden)

    Johannes Petrus Rossouw

    2013-01-01

    Full Text Available Although research assistantships are considered research learning venues in graduate education, there is a scarcity of literature that examines ethical elements attached to the employment of graduate student research assistants or the position of their research supervisors. This article explores the need to implement formal regulations specific to research assistantships in order to increase security and decrease risks for research assistants and research supervisors. Relationships between research assistants and research supervisors have some similarities with regular employment relationships; yet some distinct differences arise due to the educational and developmental nature of research assistantships. The article is written from a dual perspective reflecting the authors’ roles (a research supervisor and a research assistant, respectively and institutional locations (Faculties of Education in South Africa and Canada. The authors draw from existing literature, an analysis of institutional policies and practices at their universities, and their personal and professional experiences to illustrate risks that research assistants and their supervisors may face within research assistantships. They assess the extent to which existing and proposed policies and practices influence working conditions and safeguard experiences within graduate research assistantships. The findings reveal that research assistantships are a unique form of employment focused on educational and professional development that requires specific documentation of expected standards of practice. The authors argue that lack of clear regulations exposes both parties to unnecessary risks and offer recommendations for creating a “Standards of Good Practice” document that will be useful for individuals engaged in research assistantships.

  16. Qualitative environmental health research: an analysis of the literature, 1991-2008.

    Science.gov (United States)

    Scammell, Madeleine Kangsen

    2010-08-01

    Recent articles have advocated for the use of qualitative methods in environmental health research. Qualitative research uses nonnumeric data to understand people's opinions, motives, understanding, and beliefs about events or phenomena. In this analysis of the literature, I report the use of qualitative methods and data in the study of the relationship between environmental exposures and human health. A primary search on ISI Web of Knowledge/Web of Science for peer-reviewed journal articles dated from 1991 through 2008 included the following three terms: qualitative, environ*, and health. Inclusion and exclusion criteria are described. Searches resulted in 3,155 records. Data were extracted and findings of articles analyzed to determine where and by whom qualitative environmental health research is conducted and published, the types of methods and analyses used in qualitative studies of environmental health, and the types of information qualitative data contribute to environmental health. Ninety-one articles met inclusion criteria. These articles were published in 58 different journals, with a maximum of eight for a single journal. The results highlight a diversity of disciplines and techniques among researchers who used qualitative methods to study environmental health, with most studies relying on one-on-one interviews. Details of the analyses were absent from a large number of studies. Nearly all of the studies identified increased scientific understanding of lay perceptions of environmental health exposures. Qualitative data are published in traditionally quantitative environmental health studies to a limited extent. However, this analysis demonstrates the potential of qualitative data to improve understanding of complex exposure pathways, including the influence of social factors on environmental health, and health outcomes.

  17. 75 FR 9001 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2010-02-26

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... Research and Education (9487). Dates: March 18, 2010, 8:30 a.m.-5 p.m. March 19, 2010, 8:30 a.m.-1 p.m... support for environmental research and education. Agenda March 18, 2010 Update on recent NSF environmental...

  18. SUstaiNability: a science communication website on environmental research

    Science.gov (United States)

    Gravina, Teresita; Rutigliano, Flora Angela

    2015-04-01

    Environmental news mainly reach not specialist people by mass media, which generally focuses on fascinating or catastrophic events without reporting scientific data. Otherwise, scientific data on environment are published in peer-reviewed journals with specific language, so they could be not understandable to common people. In the last decade, Internet spread made easier to divulge environmental information. This allows everyone (scientist or not) to publish information without revision. In fact, World Wide Web includes many scientific sites with different levels of confidence. Within Italian scientific websites, there are those of University and Research Centre, but they mainly contain didactic and bureaucratic information, generally lacking in research news, or reporting them in peer-reviewed format. University and Research Centre should have an important role to divulge certified information, but news should be adapted to a general audience without scientific skills, in order to help population to gain knowledge on environmental issues and to develop responsible behavior. Therefore, an attractive website (www.sunability.unina2.it) has been created in order to divulge research products of Environmental, Biological and Pharmaceutical Sciences and Technologies Department (DiSTABiF) of Second University of Naples-SUN (Campania, Southern Italy). This website contains divulgation articles derived from peer-reviewed publications of DiSTABiF researchers and concerning studies on environmental, nutrition, and health issues, closely related topics. Environmental studies mainly referred to Caserta district (Southern Italy), where DiSTABiF is located. Divulgation articles have been shared by main social networks (Facebook: sunability, Twitter: @SUNability) and accesses have been monitored for 28 days in order to obtain demographic and geographic information about users and visualization number of both DiSTABiF website and social network pages. Demographic and geographic

  19. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  20. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  1. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  2. The “geotoxicology” of airborne particulate matter: implications for public health, public policy, and environmental security (Invited)

    Science.gov (United States)

    Plumlee, G. S.; Morman, S. A.

    2009-12-01

    Exposures to airborne particulate matter (PM) have been documented and hypothesized as the cause of a wide variety of adverse health effects. Most attention has focused on potential health effects of occupational and environmental exposures to many types of anthropogenic PM, such as mineral dusts or combustion byproducts of fossil fuels. However, geogenic PM (produced from the Earth by natural processes) and geoanthropogenic PM (produced from natural sources but modified by human activities) are also increasingly of concern as potential agents of toxicity and disease, via both environmental and occupational exposures. Geotoxicology can be defined as the study of the toxicological characteristics and potential health effects of geogenic and geoanthropogenic earth materials. Acute exposures to high PM concentrations are associated with exacerbated asthma, other pulmonary inflammatory responses, cardiovascular problems, and other issues. Some diseases can result from inhalation of dust-borne pathogens. PM can contain bioaccessible (readily dissolved in the body’s fluids) contaminants that, if absorbed in sufficient doses, can trigger toxicity. Acutely bioreactive PM, such as alkaline wildfire ash or acidic volcanic fog, can trigger acute irritation or damage of the respiratory tract, eyes, and skin. Biodurable PM such as asbestos fibers and crystalline silica are poorly cleared by lung macrophages, do not readily dissolve in the fluids lining the lungs, and can therefore persist in the lungs for decades. In sufficient dose, pneumoconioses can result from exposure to biodurable minerals, and chronic fluid-mineral reactions in the body (such as redox cycling and formation of free radicals) are thought to help promote cancers such as lung cancer and (in the case of asbestos) mesothelioma. Many key research questions remain, such as the exact mechanisms by which many types of PM cause disease, or the levels of exposure above which various types of PM begin to pose a

  3. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  4. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  5. Recapturing the corporate environmental management research agenda

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Madsen, Henning

    2009-01-01

    of corporate environmental management, and to identify any new critical and innovative research which moves beyond the compliance and certification approach. It discusses the threatening effects of consumption and industrialization which the decision makers worldwide have continuously face during the past....

  6. Research gaps related to the environmental impacts of electronic cigarettes

    OpenAIRE

    Chang, Hoshing

    2014-01-01

    Objective To consider the research gaps related to the environmental impacts of electronic cigarettes due to their manufacture, use and disposal. Methods Literature searches were conducted through December 2013. Studies were included in this review if they related to the environmental impacts of e-cigarettes. Results Scientific information on the environmental impacts of e-cigarette manufacturing, use and disposal is very limited. No studies formally evaluated the environmental impacts of the...

  7. Enabling nutrient security and sustainability through systems research.

    Science.gov (United States)

    Kaput, Jim; Kussmann, Martin; Mendoza, Yery; Le Coutre, Ronit; Cooper, Karen; Roulin, Anne

    2015-05-01

    Human and companion animal health depends upon nutritional quality of foods. Seed varieties, seasonal and local growing conditions, transportation, food processing, and storage, and local food customs can influence the nutrient content of food. A new and intensive area of investigation is emerging that recognizes many factors in these agri-food systems that influence the maintenance of nutrient quality which is fundamental to ensure nutrient security for world populations. Modeling how these systems function requires data from different sectors including agricultural, environmental, social, and economic, but also must incorporate basic nutrition and other biomedical sciences. Improving the agri-food system through advances in pre- and post-harvest processing methods, biofortification, or fortifying processed foods will aid in targeting nutrition for populations and individuals. The challenge to maintain and improve nutrient quality is magnified by the need to produce food locally and globally in a sustainable and consumer-acceptable manner for current and future populations. An unmet requirement for assessing how to improve nutrient quality, however, is the basic knowledge of how to define health. That is, health cannot be maintained or improved by altering nutrient quality without an adequate definition of what health means for individuals and populations. Defining and measuring health therefore becomes a critical objective for basic nutritional and other biomedical sciences.

  8. Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.

    Science.gov (United States)

    O'Lear, Shannon

    1999-01-01

    Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…

  9. Re-introducing environmental change drivers in biodiversity-ecosystem functioning research

    Science.gov (United States)

    De Laender, Frederik; Rohr, Jason R.; Ashauer, Roman; Baird, Donald J.; Berger, Uta; Eisenhauer, Nico; Grimm, Volker; Hommen, Udo; Maltby, Lorraine; Meliàn, Carlos J.; Pomati, Francesco; Roessink, Ivo; Radchuk, Viktoriia; Van den Brink, Paul J.

    2016-01-01

    For the past 20 years, research on biodiversity and ecosystem functioning (B-EF) has only implicitly considered the underlying role of environmental change. We illustrate that explicitly re-introducing environmental change drivers in B-EF research is needed to predict the functioning of ecosystems facing changes in biodiversity. Next, we show how this reintroduction improves experimental control over community composition and structure, which helps to obtain mechanistic insight about how multiple aspects of biodiversity relate to function, and how biodiversity and function relate in food-webs. We also highlight challenges for the proposed re-introduction, and suggest analyses and experiments to better understand how random biodiversity changes, as studied by classic approaches in B-EF research, contribute to the shifts in function that follow environmental change. PMID:27742415

  10. Exploring propositions about perceptions of energy security: An international survey

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Valentine, Scott Victor; Jain Bambawale, Malavika; Brown, Marilyn A.; Fátima Cardoso, Terezinha de; Nurbek, Sayasat; Suleimenova, Gulimzhan; Li Jinke; Xu Yang; Jain, Anil; Alhajji, A.F.; Zubiri, Andrew

    2012-01-01

    This study investigates how energy users from government, industry, civil society, and academia perceive of energy security challenges. It also analyzes how demographic characteristics influence such perceptions, and how geography, economic structure, modes of domestic energy production, and culture shape energy security priorities. Its primary source of data is a four-part survey distributed in seven languages (English, Mandarin, Portuguese, Russian, Arabic, German, and Japanese) to 2167 respondents in Brazil, China, Germany, India, Kazakhstan, Japan, Papua New Guinea, Saudi Arabia, Singapore, and the United States. These countries were selected because they represent a mix of urban and rural populations, developed and developing economies, import- and export-oriented energy trading flows, communist and capitalist societies, liberalized and state-owned energy markets, and small and large geographic sizes. The survey results are used to test four propositions about energy security related to the education, age, occupation, and gender of respondents, as well five propositions about national energy priorities and the interconnected attributes of security of supply, energy efficiency, energy research and development, energy trade, diversification and decentralization, affordability, environmental quality, climate change, and energy governance.

  11. Radioactive waste management and its implications for environmental research

    International Nuclear Information System (INIS)

    Murray, C.N.; Girardi, F.; Bertozzi, G.; Myttenaere, C.

    1980-01-01

    Environmental mobility and biological availability of radioelements in the biosphere is one of the four barriers which assure the segregation of radioactivity when the radioactive wastes are disposed into geologic formations. In carrying out studies on long-term risk assessment associated with waste disposal of this type, the terrestrial and aquatic models are developed to represent the above mentioned barrier so that risk linked with this barrier is realistically evaluated. These models help in identifying areas of research in environmental field for proper assessment of risk and in optimizing the relationship between requirements of risk assessment and ecological investigations. The three basic areas identified for research are realistic transfer coefficients between various ecological compartments, transfer mechanisms, and long-term evolution of various environmental compartments. Both laboratory and in situ studies are carried out and their results are used in developing models. Various research projects in progress under the Radiological Protection Programme of the Commission of European Community (CEC) are mentioned. As expertise from various fields is required for this research and is not possibly available at a single place, CEC has given research contracts for certain projects to national laboratories so that expertise available with them is utilised and CEC also is engaged directly in research activities which are carried out at its Joint Research Centre. Advisory Committee for Programme Management of the CEC provides the link between various actions and the necessary flow of information between the CEC and the national research teams within the European Community. (M.G.B.)

  12. Researches carried out by Japan Atomic Energy Research Institute in the field of environmental protection

    International Nuclear Information System (INIS)

    Kavakami, Yu.

    2000-01-01

    The results of works, accomplished by the Japanese Atomic Energy Research Institute, related to evaluation of the nuclear facilities effect on the environmental medium, are considered. The analytical results of studies on the environmental radioactivity with an account of meteorological aspects, evaluation of the nuclear facilities impact on the environmental medium are presented. Studies on the radionuclide behavior in the environmental medium cover large range of problems: distribution of natural and artificial radionuclides in the surface medium and their migration; evaluation of the human radiation doses on the account of radionuclides; environmental medium protection and risk evaluation. The method for measuring the 90 Sr concentrations with application of ion-exchange tars and a simple method for determining the radon activity with application of liquid scintillators were developed in the process of the study on creation of the environmental medium monitoring. The studies, related to the content and behavior of tritium, Pu, 137 Cs, 247 Am, as well as mercury and other heavy metals in the environmental medium were carried out. The methods for evaluating the NPPs radiation effect on the population with an account of the radioactive substances releases both by normal operation and in the emergency situations, were developed. Attention is also paid to research programs and developed codes [ru

  13. Program director`s report for the Office of Health and Environmental Research

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-07-01

    LBNL performs basic and applied research and develops technologies in support of the Department of Energy Office of Health and Environmental Research`s mission to explore and mitigate the long-term health and environmental consequences of energy use and to advance solutions to major medical challenges. The ability of the Laboratory to engage in this mission depends upon the strength of its core competencies. In addition, there are several key capabilities that are crosscutting, or underlie, many of the core competencies. They are: bioscience and biotechnology; environmental assessment and remediation; advanced detector systems; materials characterization and synthesis; chemical dynamics, catalysis, and surface science; advanced technologies for energy supply and energy efficiency; particle and photon beams; national research facilities; computation and information management; engineering design and fabrication technologies; and education of future scientists and engineers. Research in progress and major accomplishments are summarized for projects in analytical technology; environmental research; health effects; molecular carcinogenesis; general life sciences; human genome project; medical applications; and imaging of E-binding proteins.

  14. Environmental survey at Lucas Heights Research Laboratories, 1993

    International Nuclear Information System (INIS)

    Hoffmann, E.L.; Looz, T.

    1995-04-01

    Results are presented of the environmental survey conducted in the neighbourhood of the Lucas Heights Research Laboratories during 1993. No activity which could have originated from these laboratories was found in samples collected from possible human food chains. All low-level liquid and gaseous waste discharges were within authorised limits. The maximum possible annual dose to the general public from airborne discharges during this period is estimated to be less than 0.01 mSv, which is one per cent of the dose limit for long term exposure that is recommended by the National Health and Medical Research Council. A list of previous environmental survey reports is attached. 22 refs., 21 tabs., 4 figs

  15. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  16. Safeguards and Security Research and Development progress report, October 1990--September 1991

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1992-07-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research And Development (R ampersand D) program from October 1990 through September 1991. The activities presented in the first three parts--Science and Technology Base Development, Basic Systems Design, and Onsite Test and Evaluation and Facility Support--were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS). The activities described in Part 4--International Safeguards--were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (OACN/IS). Part 5 describes several safeguards or safeguards-related activities that have sponsors other than the DOE/OSS or OACN/IS. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published in 1991

  17. Safeguards and security research and development progress report, October 1993--September 1994

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. [comp.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R&D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy`s Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R&D reports, technical journal articles, and conference papers that were published or presented in 1994.

  18. Safeguards and security research and development progress report, October 1993--September 1994

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R ampersand D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published or presented in 1994

  19. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  20. Reclaim “Education” in environmental and sustainability education research

    DEFF Research Database (Denmark)

    Sund, Per; Lysgaard, Jonas Greve

    2013-01-01

    Without contextualization and explicit links to centuries of relevant educational theories, research presentations at conferences risk appearing disconnected from teaching method development or evaluation. Environmental and Sustainability Education (ESE), is a highly vibrant research area...

  1. Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.

    2010-01-01

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as

  2. RESEARCH ON ENVIRONMENTAL HEALTH INTERVENTIONS: ETHICAL PROBLEMS AND SOLUTIONS

    Science.gov (United States)

    RESNIK, DAVID B.; ZELDIN, DARRYL C.; SHARP, RICHARD R.

    2014-01-01

    This article reviews a variety of ethical issues one must consider when conducting research on environmental health interventions on human subjects. The paper uses the Kennedy Krieger Institute lead abatement study as well as a hypothetical asthma study to discuss questions concerning benefits and risks, risk minimization, safety monitoring, the duty to warn, the duty to report, the use of control groups, informed consent, equitable subject selection, privacy, conflicts of interest, and community consultation. Research on environmental health interventions can make an important contribution to our understanding of human health and disease prevention, provided it is conducted in a manner that meets prevailing scientific, ethical, and legal standards for research on human subjects. PMID:16220621

  3. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong; Kim, Young Ki; Park, Jaek Wan

    2012-01-01

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security

  4. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Seoul (Korea, Republic of); Son, Han Seong [Joongbu Univ., Chungnam (Korea, Republic of); Kim, Young Ki; Park, Jaek Wan [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security.

  5. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  6. Yearly plan of safety research on environmental radioactivity for 1996 - 2000

    International Nuclear Information System (INIS)

    1996-01-01

    'Yearly Plan of Safety Research on Environmental Radioactivity' proposed from the special meeting for safety research of environmental radioactivity on December 14, 1995 was investigated by Nuclear Safety Commission. And the safety research of environmental radioactivity in Japan was decided to be pursued according to the plan. The contents of this plan consisted of the purpose and the contents of research as well as the research period and the facilities to be done for each theme. The following themes were included; 1) study on environment·radiation dose and study on radiation exposure reduction. 2) study on biological effects of radiation. 3) study on internal exposure by specified nuclides. 4) study on medical measures for acute radiation exposure. 5) study on assessment of nuclear safety. 6) investigation on radioactivities released from various nuclear facilities in Japan to demonstrate their safety. (M.N.)

  7. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  8. Eighth International Symposium on Recent Advances in Environmental Health Research

    Directory of Open Access Journals (Sweden)

    Paul B. Tchounwou

    2012-05-01

    Full Text Available This special issue of International Journal of Environmental Research and Public Health is dedicated to the publication of selected papers presented at the Eighth International Symposium on Recent Advances in Environmental Health Research. The Symposium was organized by Jackson State University (JSU from September 18-21, 2011 at the Marriott Hotel in Jackson, Mississippi. It was built upon the overwhelming success of seven previous symposia hosted by JSU. [...

  9. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  10. Managing environmental enhancement plans for individual research projects at a national primate research center.

    Science.gov (United States)

    Thom, Jinhee P; Crockett, Carolyn M

    2008-05-01

    We describe a method for managing environmental enhancement plans for individual research projects at a national primate research center where most monkeys are assigned to active research projects. The Psychological Well-being Program (PWB) at the University of Washington National Primate Research Center developed an Environmental Enhancement Plan form (EEPL) that allows PWB to quantify and track changes in enrichment allowances over time while ensuring that each animal is provided with as much enrichment as possible without compromising research. Very few projects involve restrictions on toys or perches. Some projects have restrictions on food treats and foraging, primarily involving the provision of these enrichments by research staff instead of husbandry staff. Restrictions are not considered exemptions unless they entirely prohibit an element of the University of Washington Environmental Enhancement Plan (UW EE Plan). All exemptions must be formally reviewed and approved by the institutional animal care and use committee. Most exemptions from elements of the UW EE Plan involve social housing. Between 2004 and 2006, the percentage of projects with no social contact restrictions increased by 1%, but those prohibiting any tactile social contact declined by 7%, and projects permitting tactile social contact during part of the study increased by 9%. The EEPL form has facilitated informing investigators about the enrichment their monkeys will receive if no restrictions or exemptions are requested and approved. The EEPL form also greatly enhances PWB's ability to coordinate the specific enrichment requirements of a project.

  11. 78 FR 29121 - Strategic Environmental Research and Development Program, Scientific Advisory Board; Notice of...

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Strategic Environmental Research and Development... Department of Defense announces an open meeting of the Strategic Environmental Research and Development... requesting Strategic Environmental Research and Development Program funds in excess of $1 million over the...

  12. 78 FR 29122 - Strategic Environmental Research and Development Program, Scientific Advisory Board; Notice of...

    Science.gov (United States)

    2013-05-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Strategic Environmental Research and Development... Department of Defense announces an open meeting of the Strategic Environmental Research and Development... development projects requesting Strategic Environmental Research and Development Program funds in excess of $1...

  13. Bridging nuclear safety, security and safeguards at geological disposl of high level radioactive waste and spent nuclear fuel

    International Nuclear Information System (INIS)

    Niemeyer, Irmgard; Deissmann, Guido; Bosbach, Dirk

    2016-01-01

    Findings and recommendations: • Further R&D needed to identify concepts, methods and technologies that would be best suited for the holistic consideration of safety, security and safeguards provisions of geological disposal. • 3S ‘toolbox’, including concepts, methods and technologies for: ■ material accountancy, ■ measurement techniques for spent fuel verification, ■ containment and surveillance, ■ analysis of open source information, ■ environmental sampling and monitoring, ■ continuity of knowledge, ■ design implications. •: Bridging safety, security and safeguards in research funding and research activities related to geological disposal of high-level radioactive waste and spent nuclear fuel.

  14. Strengthening Multidisciplinary Research on Climate and Environmental Change

    Science.gov (United States)

    Beer, Tom; Li, Jianping; Alverson, Keith

    2014-08-01

    The difficulty with multidisciplinary research is finding common ground for scientists, whose approach to a particular scientific problem can differ radically. For example, there is agreement between the geophysical community and the food science and technology community that food security is an important issue. However, the climate change community sees possible solutions coming from more detailed studies on the links between climate change and agriculture, whereas the food science community sees possible solutions emerging from studies of food logistics and supply chains.

  15. Research on continuous environmental radiation monitoring system for NPP based on wireless sensor network

    International Nuclear Information System (INIS)

    Fu Hailong; Jia Mingchun; Peng Guichu

    2010-01-01

    According to the characteristics of environmental gamma radiation monitoring and the requirement of nuclear power plant (NPP) developing, a new continuous environmental radiation monitoring system based on wireless sensor network (WSN) was presented. The basic concepts and application of WSN were introduced firstly. And then the characteristics of the new system were analyzed. At the same time the configuration of the WSN and the whole structure of the system were built. Finally, the crucial techniques used in system designing, such as the design of sensor node, the choice of communication mode and protocol, the time synchronization and space location, the security of the network and the faults tolerance were introduced. (authors)

  16. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  17. Long-Term Environmental Research Programs - Evolving Capacity for Discovery

    Science.gov (United States)

    Swanson, F. J.

    2008-12-01

    Long-term forestry, watershed, and ecological research sites have become critical, productive nodes for environmental science research and in some cases for work in the social sciences and humanities. The Forest Service's century-old Experimental Forests and Ranges and the National Science Foundation's 28- year-old Long-Term Ecological Research program have been remarkably productive in both basic and applied sciences, including characterization of acid rain and old-growth ecosystems and development of forest, watershed, and range management systems for commercial and other land use objectives. A review of recent developments suggests steps to enhance the function of collections of long-term research sites as interactive science networks. The programs at these sites have evolved greatly, especially over the past few decades, as the questions addressed, disciplines engaged, and degree of science integration have grown. This is well displayed by small, experimental watershed studies, which first were used for applied hydrology studies then more fundamental biogeochemical studies and now examination of complex ecosystem processes; all capitalizing on the legacy of intensive studies and environmental monitoring spanning decades. In very modest ways these collections of initially independent sites have functioned increasingly as integrated research networks addressing inter-site questions by using common experimental designs, being part of a single experiment, and examining long-term data in a common analytical framework. The network aspects include data sharing via publicly-accessible data-harvester systems for climate and streamflow data. The layering of one research or environmental monitoring network upon another facilitates synergies. Changing climate and atmospheric chemistry highlight a need to use these networks as continental-scale observatory systems for assessing the impacts of environmental change on ecological services. To better capitalize on long

  18. The Roots and Routes of Environmental and Sustainability Education Policy Research

    Science.gov (United States)

    Van Poeck, Katrien; Lysgaard, Jonas A.

    2016-01-01

    "Environmental Education Research" has developed a Virtual Special Issue (VSI) (http://explore.tandfonline.com/content/ed/ceer-vsi) focusing on studies of environmental and sustainability education (ESE) policy. The VSI draws on key examples of research on this topic published in the Journal from the past two decades, for three reasons.…

  19. Management of the Interface between Nuclear Safety and Security for Research Reactors

    International Nuclear Information System (INIS)

    2016-08-01

    The aim of this publication is to provide technical guidelines and practical information to assist Member States, operating organizations and regulatory bodies, on the basis of international good practices, and to manage the interface between nuclear safety and security at research reactor facilities in an integrated and coordinated manner. The publication was developed based on input from IAEA technical and consultants' meetings held between 2013 and 2015

  20. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  1. Focus on CSIR research in pollution and waste: environmental health

    CSIR Research Space (South Africa)

    Godfrey, Linda K

    2007-08-01

    Full Text Available A healthy population is seen as an important precondition for economic growth and competitiveness. Research into environmental health is therefore concerned with understanding the exposure and magnitude of impact on humans from environmental hazards...

  2. Balanced program plan. Volume 10. Fusion: analysis for biomedical and environmental research

    International Nuclear Information System (INIS)

    Hungate, F.P.

    1976-06-01

    Development of the Balanced Program Plan for analysis for biomedical and environmental research was initiated in the spring of 1975. The goal was a redefinition of research efforts and priorities to meet ERDA's requirements for a program of health and environmental research to support the development and commercialization of energy technologies. As part of the Balanced Program planning effort the major ERDA-supported multidisciplinary laboratories were assigned responsibility for analyzing the research needs of each of nine energy technologies and describing a research program to meet these needs. The staff of the Division of Biomedical and Environmental Research was assigned the task of defining a research program addressed to each of five biomedical and environmental research categories (characterization, measurement and monitoring; physical and chemical processes and effects; health effects; ecological effects; and integrated assessment and socioeconomic processes and effects) applicable to all energy technologies. The first drafts of these documents were available for a work-shop in June 1975 at which the DBER staff and scientists from the laboratories developed a comprehensive set of program recommendations. Pacific Northwest Laboratory was assigned responsibility for defining research needs and a recommended research program for fusion and fission technologies. This report, Volume 10, presents the input for fusion

  3. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  4. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  5. Ninth International Symposium on Recent Advances in Environmental Health Research

    Directory of Open Access Journals (Sweden)

    Paul B. Tchounwou

    2014-01-01

    Full Text Available This special issue of International Journal of Environmental Research and Public Health is dedicated to the publication of selected papers presented at the Eighth International Symposium on Recent Advances in Environmental Health Research. The Symposium was organized by Jackson State University (JSU from 16–19 September, 2012 at the Marriott Hotel in Jackson, Mississippi, USA. It was built upon the overwhelming success of seven previous symposia hosted by JSU.

  6. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  7. Hydropedology as a powerful tool for environmental policy research

    NARCIS (Netherlands)

    Bouma, J.

    2006-01-01

    Rather than produce clear-cut answers to well-defined problems, research on future environmental policy issues requires a different approach whereby researchers are partners in joint learning processes among stakeholders, policy makers, NGOs (Non-Governmental Organisations) and industry. This

  8. Evaluation of mid-to-long term basic research for environmental restoration

    International Nuclear Information System (INIS)

    1989-09-01

    This document describes a long-term basic research program for the US Department of Energy (DOE) that complements departmental initiatives in waste management and site cleanup. The most important problems faced by DOE are environmental restoration of waste sites and cleanup of inactive facilities. Environmental restoration is defined in this report as characterization, assessment, remediation, and post-closure verification within the waste/environmental system at DOE sites. Remediation of inactive, contaminated waste-disposal sites is the largest and most expensive task facing DOE. Immobilization, isolation, separation, and destruction of waste, either aboveground or in situ, are difficult and costly tasks. Technologies for these tasks are primitive or do not exist. Departmental problems in the long term are being analyzed scientifically and research needs are being identified. When completed, the Office of Energy Research's (OER's) basis research plan will describe potential scientific research needs for universities, national laboratories, and others as a basis for research proposals to DOE. Extensive interaction with the scientific community is planned to further refine and prioritize research needs. Basic research within DOE is directed toward fundamental knowledge leading to the discovery of new scientific or engineering concepts and principles that may or may not have immediate specific technological applications. However, because DOE is a mission-oriented agency, basic research in DOE is strongly influenced by national energy and environmental policy and may be multidisciplinary in nature. Basic research will provide innovative concepts and the fundamental knowledge base that facilitates the development and application of new and emerging technologies. 41 refs., 5 figs., 9 tabs

  9. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  10. Secure Infant-Mother Attachment Buffers the Effect of Early-Life Stress on Age of Menarche.

    Science.gov (United States)

    Sung, Sooyeon; Simpson, Jeffry A; Griskevicius, Vladas; Kuo, Sally I-Chun; Schlomer, Gabriel L; Belsky, Jay

    2016-05-01

    Prior research indicates that being reared in stressful environments is associated with earlier onset of menarche in girls. In this research, we examined (a) whether these effects are driven by exposure to certain dimensions of stress (harshness or unpredictability) during the first 5 years of life and (b) whether the negative effects of stress on the timing of menarche are buffered by secure infant-mother attachment. Results revealed that (a) exposure to greater harshness (but not unpredictability) during the first 5 years of life predicted earlier menarche and (b) secure infant-mother attachment buffered girls from this effect of harsh environments. By connecting attachment research to its evolutionary foundations, these results illuminate how environmental stressors and relationships early in life jointly affect pubertal timing. © The Author(s) 2016.

  11. Report to Congress on the U.S. Department of Energy's Environmental Management Science Program: Research funded and its linkages to environmental cleanup problems, and Environmental Management Science Program research award abstracts. Volume 2 of 3 -- Appendix B

    International Nuclear Information System (INIS)

    1998-04-01

    The Department of Energy's Environmental Management Science Program (EMSP) serves as a catalyst for the application of scientific discoveries to the development and deployment of technologies that will lead to reduction of the costs and risks associated with cleaning up the nation's nuclear complex. Appendix B provides details about each of the 202 research awards funded by the EMSP. This information may prove useful to researchers who are attempting to address the Department's environmental management challenges in their work, program managers who are planning, integrating, and prioritizing Environmental Management projects, and stakeholders and regulators who are interested in the Department's environmental challenges. The research award information is organized by the state and institution in which the lead principal investigator is located. In many cases, the lead principal investigator is one of several investigators at a number of different institutions. In these cases, the lead investigator (major collaborator) at each of the additional institutions is listed. Each research award abstract is followed by a list of high cost projects that can potentially be impacted by the research results. High cost projects are Environmental Management projects that have total costs greater than $50 million from the year 2007 and beyond, based on the March 1998 Accelerating Cleanup: Paths to Closure Draft data, and have costs or quantities of material associated with an Environmental Management problem area. High cost projects which must remain active in the year 2007 and beyond to manage high risk are also identified. Descriptions of these potentially related high cost Environmental Management projects can be found in Appendix C. Additional projects in the same problem area as a research award can be located using the Index of High Cost Environmental Management Projects by Problem Area, at the end of Appendices B and C

  12. 76 FR 81918 - Strategic Environmental Research and Development Program (SERDP), Scientific Advisory Board...

    Science.gov (United States)

    2011-12-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Strategic Environmental Research and Development Program (SERDP), Scientific Advisory Board; Notice of Meeting AGENCY: Department of Defense. ACTION... research and development projects requesting Strategic Environmental Research and Development Program...

  13. Environmental monitoring and research at the John F. Kennedy Space Center

    Science.gov (United States)

    Hall, C. R.; Hinkle, C. R.; Knott, W. M.; Summerfield, B. R.

    1992-01-01

    The Biomedical Operations and Research Office at the NASA John F. Kennedy Space Center has been supporting environmental monitoring and research since the mid-1970s. Program elements include monitoring of baseline conditions to document natural variability in the ecosystem, assessments of operations and construction of new facilities, and ecological research focusing on wildlife habitat associations. Information management is centered around development of a computerized geographic information system that incorporates remote sensing and digital image processing technologies along with traditional relational data base management capabilities. The proactive program is one in which the initiative is to anticipate potential environmental concerns before they occur and, by utilizing in-house expertise, develop impact minimization or mitigation strategies to reduce environmental risk.

  14. Research characteristics and status on Environmental Psychology: a bibliometric and knowledge mapping analysis

    Science.gov (United States)

    Xu, Jun Hua; Zhu, Lei Ye; Wang, Hai Bin

    2018-06-01

    Environmental psychology is an interdisciplinary field that focuses on the interplay between individuals and their built and natural environments. Great progress has been made in the areas of environmental psychology by researchers form many countries. However, a thorough quantitative analysis to the emergent research trends and topics has not been found. To reveal the research characteristics and status on Environmental Psychology, 853 related papers from Web of Science core collection were analysed by CiteSpace II. The results show that: (1) the domain of Environmental Psychology was started in 1960s and showed a low growth over the past half century, which reaches a historical peak in 2017. Gifford, USA and the Journal of Environmental Psychology top the list of contributing authors, country and publication respectively. (2) "Environmental Psychology" is the most frequently keywords and has the longest span of the bursts. "ambient scent", "recycling", "children as outsiders" and "ambient temperature" are the top four largest clusters, which are the popular research topics in the domain of environmental psychology.

  15. Overview of environmental research at the Savannah River Laboratory

    International Nuclear Information System (INIS)

    Harvey, R.S.

    1977-01-01

    Research in the environmental sciences by the Savannah River Laboratory (SRL) has the general objective of improving our understanding of transport through ecosystems and functional processes within ecosystems. With increased understanding, the basis for environmental assessments can be improved for releases from the Savannah River Plant or from the power industry of the southeastern United States

  16. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  17. The roots and routes of environmental and sustainability education policy research

    DEFF Research Database (Denmark)

    Lysgaard, Jonas Andreasen; Van Poeck, Katrien

    2016-01-01

    Environmental Education Research has developed a Virtual Special Issue (VSI) (http://explore.tandfonline.com/content/ed/ceer-vsi) focusing on studies of environmental and sustainability education (ESE) policy. The VSI draws on key examples of research on this topic published in the Journal from...... the past two decades, for three reasons. First, to provide readers with a series of snapshots into the genealogy of ESE policy research in this field. Second, to encourage renewed attention to previously published work. And third, to offer commentary on the evolution of research trends, approaches...

  18. Wastes behavior and environmental impacts, researches and methods

    International Nuclear Information System (INIS)

    Labeyrie, J.; Chateau, L.; Gin, St.

    2001-01-01

    The wastes management policy takes into account more and more often the environmental impacts mastership. This evolution is particularly appreciable when the wastes directly interact with the environment: storage, utilization for roads construction and so on. In this context the ADEME organized the 8 june 2000 a colloquium to present the new evaluation methods and tools, to describe the regulations and to identify the research programs needed for this environmental policy. Eleven papers are presented. (A.L.B.)

  19. 78 FR 48200 - Advisory Committee for Environmental Research and Education; Notice of Meeting

    Science.gov (United States)

    2013-08-07

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Environmental Research and Education; Notice of... Research and Education, 9487. Dates: September 11, 2013, 9:00 a.m.-5:00 p.m., and September 12, 2013, 9:00... research and education. Agenda September 11, 2013 Update on NSF environmental research and education...

  20. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  1. 75 FR 5288 - Strategic Environmental Research and Development Program, Scientific Advisory Board

    Science.gov (United States)

    2010-02-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Strategic Environmental Research and Development Program, Scientific Advisory Board AGENCY: Department of Defense (DOD). ACTION: Notice. SUMMARY: This... requesting Strategic Environmental Research and Development Program funds in excess of $1M. This meeting is...

  2. Classification,Hazards and Countermeasures of Agricultural Environmental Pollution Emergencies

    Institute of Scientific and Technical Information of China (English)

    Xiaoming; CHUAI; Haixia; ZHOU; Jianping; ZHAO; Shubo; CHENG; Jiang; YU

    2013-01-01

    Agricultural environmental pollution emergencies have become a hot research topic because of the high incidence and influence depth.This paper introduces classification and features of agricultural environmental pollution emergencies:by pollutant type,it falls into organic pollution emergencies and inorganic pollution emergencies;by the approach of entering agricultural environment,it falls into water resource agricultural environmental pollution emergencies and non-water resource agricultural environmental pollution emergencies.Hazards of agricultural environmental pollution emergencies are analyzed from 4 perspectives:personal security,indirect loss,ecological environment and social stability.In view of the hazards,countermeasures are given to deal with the pollution emergencies as(i)establishing a risk evaluation mechanism for agricultural environment;(ii)enhancing the capacity of handling agricultural environmental pollution emergencies;(iii)introducing new management concepts for environmental emergencies,and cultivating keen emergency management consciousness.

  3. Privacy and ethics in pediatric environmental health research-part II: protecting families and communities.

    Science.gov (United States)

    Fisher, Celia B

    2006-10-01

    In pediatric environmental health research, information about family members is often directly sought or indirectly obtained in the process of identifying child risk factors and helping to tease apart and identify interactions between genetic and environmental factors. However, federal regulations governing human subjects research do not directly address ethical issues associated with protections for family members who are not identified as the primary "research participant." Ethical concerns related to family consent and privacy become paramount as pediatric environmental health research increasingly turns to questions of gene-environment interactions. In this article I identify issues arising from and potential solutions for the privacy and informed consent challenges of pediatric environmental health research intended to adequately protect the rights and welfare of children, family members, and communities. I first discuss family members as secondary research participants and then the specific ethical challenges of longitudinal research on late-onset environmental effects and gene-environment interactions. I conclude with a discussion of the confidentiality and social risks of recruitment and data collection of research conducted within small or unique communities, ethnic minority populations, and low-income families. The responsible conduct of pediatric environmental health research must be conceptualized as a goodness of fit between the specific research context and the unique characteristics of subjects and other family stakeholders.

  4. Sustainability and Security: Timber Certification in Asia-Pacific Region

    Directory of Open Access Journals (Sweden)

    Antonina Ivanova

    2008-10-01

    Full Text Available The expansion of sustainable development initiatives since the 1990’s reflected an emphasis on integrated solutions to economic development, socio-political stability and environmental health in the global community. In the same context the traditional concept of security needed to be open in two directions. First, the notion of security should no longer be applied only to the military realm, but also to the economic, the societal, the environmental, and the political fields. Second, the referent object of the “security” should not be conceptualized solely in terms of the state, but should embrace the individual below the state, and the international system above it. The forests industry timber certification in Asia-Pacific region has been selected as a case study because it is an excellent example to illustrate the links between the sustainable development and the environmental security, including also certain elements of economic security. This article is presenting a critical overview of the forest industry and the status of timber certification globally, with an emphasis on Asia – Pacific countries applying the Systemic Thinking approach. In conclusion, an outlook is presented concerning the future of timber certification and possible impacts on security and sustainable development.

  5. Empirical research on financial capability evaluation of A-share listed companies in the securities industry based on principal component analysis

    Directory of Open Access Journals (Sweden)

    Xiuping Wang

    2017-11-01

    Full Text Available Based on the relevant financial data indicators of A-share markets of Shanghai and Shenzhen in 2009, with all of 29 listed companies in the securities industry as the research objects, this paper selects 10variables that can fully reflect the financial capability indicators and uses the principal component analysis to carry out the empirical research on the financial capability. The research results show that the comprehensive financial capability of listed companies in A-share securities industry must be focused on the following four capabilities, investment and income, profit, capital composition and debt repayment and cash flow indicators. In addition, the principal component analysis can effectively evaluate the financial capability of listed companies in A-share securities industry, and solve the problems in the previous analysis methods, such as excessive indicators, information overlapping and so on.

  6. Fraunhofer Institute for Atmospheric Environmental Research. Annual report 1990

    International Nuclear Information System (INIS)

    1991-01-01

    This progress report submitted by Fraunhofer Institut fuer Atmosphaerische Umweltforschung, Garmisch-Partenkirchen, reviews the institute's scientific and technical atmospheric environmental research activities of 1990. Emphasis was on research into the atmospheric circulation of CH 4 and N 2 O, the determination of the distribution and of the time characteristics of trace substances of environmental relevance, and on studies of the effects of pollutants on the vegetation. Major efforts went into the development of instruments and the modeling of the atmosphere in support of the experimental work. The FhG activities advance the research into the chemical behavior of the atmosphere, the possible effects of man-made changes in the chemical composition of the atmosphere on the greenhouse effect, the regional pollutant loads, and the effects of ground-level UV-B radiation. The activities are part of international and national joint research projects, e.g. EUROTRAC, IGAC, and ICAT. (orig./KW) [de

  7. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  8. 75 FR 55778 - Strategic Environmental Research and Development Program, Scientific Advisory Board

    Science.gov (United States)

    2010-09-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Strategic Environmental Research and Development Program, Scientific Advisory Board AGENCY: Department of Defense. ACTION: Notice. SUMMARY: This notice is... requesting Strategic Environmental Research and Development Program funds in excess of $1M. This meeting is...

  9. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  10. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  11. Security and privacy in smart grids

    CERN Document Server

    Xiao, Yang

    2013-01-01

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today'

  12. Protecting Privacy and Confidentiality in Environmental Health Research.

    Science.gov (United States)

    Resnik, David B

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully consider the facts and circumstances and use good judgment when deciding whether to breach privacy or confidentiality.

  13. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  14. Securing water quality and quantity: Research and development perspective

    CSIR Research Space (South Africa)

    Pienaar, H

    2012-10-01

    Full Text Available : ? economic growth & development ? human & environmental needs ? meeting international obligations ? energy needs (strategic water users) ? ensuring availability and allocation (all other users) ? CSIR 2012 Slide 3 Background ? SA 30th driest country... and quantity: Research and development perspective 4th Biennial Conference Harrison Pienaar 10 October 2012 Presentation outline ? Introduction and background to water in South Africa ? Transboundary water resource aspects ? Water related challenges...

  15. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  16. A scoping review of traditional food security in Alaska.

    Science.gov (United States)

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  17. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Science.gov (United States)

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  18. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    Science.gov (United States)

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  19. Impacts of multiple global environmental changes on African crop yield and water use efficiency: Implications to food and water security

    Science.gov (United States)

    Pan, S.; Yang, J.; Zhang, J.; Xu, R.; Dangal, S. R. S.; Zhang, B.; Tian, H.

    2016-12-01

    Africa is one of the most vulnerable regions in the world to climate change and climate variability. Much concern has been raised about the impacts of climate and other environmental factors on water resource and food security through the climate-water-food nexus. Understanding the responses of crop yield and water use efficiency to environmental changes is particularly important because Africa is well known for widespread poverty, slow economic growth and agricultural systems particularly sensitive to frequent and persistent droughts. However, the lack of integrated understanding has limited our ability to quantify and predict the potential of Africa's agricultural sustainability and freshwater supply, and to better manage the system for meeting an increasing food demand in a way that is socially and environmentally or ecologically sustainable. By using the Dynamic Land Ecosystem Model (DLEM-AG2) driven by spatially-explicit information on land use, climate and other environmental changes, we have assessed the spatial and temporal patterns of crop yield, evapotranspiration (ET) and water use efficiency across entire Africa in the past 35 years (1980-2015) and the rest of the 21st century (2016-2099). Our preliminary results indicate that African crop yield in the past three decades shows an increasing trend primarily due to cropland expansion (about 50%), elevated atmospheric CO2 concentration, and nitrogen deposition. However, crop yield shows substantially spatial and temporal variation due to inter-annual and inter-decadal climate variability and spatial heterogeneity of environmental drivers. Climate extremes especially droughts and heat wave have largely reduced crop yield in the most vulnerable regions. Our results indicate that N fertilizer could be a major driver to improve food security in Africa. Future climate warming could reduce crop yield and shift cropland distribution. Our study further suggests that improving water use efficiency through land

  20. Research in North-Rhine Westphalia. Environmental research in 1986 - a documentation. Forschung in Nordrhein-Westfalen. Umweltforschung 1986 - Dokumentation

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    Environmental research within the meaning of this documentation is any research aiming predominantly at reducing, avoiding, or removing environmental pollution. The documentation includes especially projects of relevance to technology and economy, natural science, biology, planning, medicine, and pedagogy. For the period of report January 1984 to February 1986, nearly 500 research projects of environmental relevance were made out at the scientific institutions of the country. Some 230 research groups and institutions are intensively studying questions relating to cyclones for dust separation, from their analytics to their use. The 13 sectors covered are: Forest die-back; planning; open areas; noise in residential areas; clean air; conservancy of nature and species; soil; foodstuffs; waters; waste; medicine and toxicology; analytics; topics of a general nature. (HSCH).

  1. Report to Congress on the U.S. Department of Energy`s Environmental Management Science Program: Research funded and its linkages to environmental cleanup problems, and Environmental Management Science Program research award abstracts. Volume 2 of 3 -- Appendix B

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-04-01

    The Department of Energy`s Environmental Management Science Program (EMSP) serves as a catalyst for the application of scientific discoveries to the development and deployment of technologies that will lead to reduction of the costs and risks associated with cleaning up the nation`s nuclear complex. Appendix B provides details about each of the 202 research awards funded by the EMSP. This information may prove useful to researchers who are attempting to address the Department`s environmental management challenges in their work, program managers who are planning, integrating, and prioritizing Environmental Management projects, and stakeholders and regulators who are interested in the Department`s environmental challenges. The research award information is organized by the state and institution in which the lead principal investigator is located. In many cases, the lead principal investigator is one of several investigators at a number of different institutions. In these cases, the lead investigator (major collaborator) at each of the additional institutions is listed. Each research award abstract is followed by a list of high cost projects that can potentially be impacted by the research results. High cost projects are Environmental Management projects that have total costs greater than $50 million from the year 2007 and beyond, based on the March 1998 Accelerating Cleanup: Paths to Closure Draft data, and have costs or quantities of material associated with an Environmental Management problem area. High cost projects which must remain active in the year 2007 and beyond to manage high risk are also identified. Descriptions of these potentially related high cost Environmental Management projects can be found in Appendix C. Additional projects in the same problem area as a research award can be located using the Index of High Cost Environmental Management Projects by Problem Area, at the end of Appendices B and C.

  2. Research data management support for large-scale, long-term, interdisciplinary collaborative research centers with a focus on environmental sciences

    Science.gov (United States)

    Curdt, C.; Hoffmeister, D.; Bareth, G.; Lang, U.

    2017-12-01

    Science conducted in collaborative, cross-institutional research projects, requires active sharing of research ideas, data, documents and further information in a well-managed, controlled and structured manner. Thus, it is important to establish corresponding infrastructures and services for the scientists. Regular project meetings and joint field campaigns support the exchange of research ideas. Technical infrastructures facilitate storage, documentation, exchange and re-use of data as results of scientific output. Additionally, also publications, conference contributions, reports, pictures etc. should be managed. Both, knowledge and data sharing is essential to create synergies. Within the coordinated programme `Collaborative Research Center' (CRC), the German Research Foundation offers funding to establish research data management (RDM) infrastructures and services. CRCs are large-scale, interdisciplinary, multi-institutional, long-term (up to 12 years), university-based research institutions (up to 25 sub-projects). These CRCs address complex and scientifically challenging research questions. This poster presents the RDM services and infrastructures that have been established for two CRCs, both focusing on environmental sciences. Since 2007, a RDM support infrastructure and associated services have been set up for the CRC/Transregio 32 (CRC/TR32) `Patterns in Soil-Vegetation-Atmosphere-Systems: Monitoring, Modelling and Data Assimilation' (www.tr32.de). The experiences gained have been used to arrange RDM services for the CRC1211 `Earth - Evolution at the Dry Limit' (www.crc1211.de), funded since 2016. In both projects scientists from various disciplines collect heterogeneous data at field campaigns or by modelling approaches. To manage the scientific output, the TR32DB data repository (www.tr32db.de) has been designed and implemented for the CRC/TR32. This system was transferred and adapted to the CRC1211 needs (www.crc1211db.uni-koeln.de) in 2016. Both

  3. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  4. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  5. FY 1995 research highlights: PNL accomplishments in OER programs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    Pacific Northwest Laboratory (PNL) conducts fundamental and applied research in support of the US Department of Energy`s (DOE) core missions in science and technology, environmental quality, energy resources, and national security. Much of this research is funded by the program offices of DOE`s Office of Energy Research (DOE-ER), primarily the Office of Basic Energy Sciences (BES) and the Office of Health and Environmental Research (OHER), and by PNL`s Laboratory Directed Research and Development (LDRD) Program. This document is a collection of research highlights that describe PNL`s accomplishments in DOE-ER funded programs during Fiscal Year 1995. Included are accomplishments in research funded by OHER`s Analytical Technologies, Environmental Research, Health Effects, General Life Sciences, and Carbon Dioxide Research programs; BES`s Materials Science, Chemical Sciences, Engineering and Geoscience, and Applied Mathematical Sciences programs; and PNL`s LDRD Program. Summaries are given for 70 projects.

  6. Privacy and ethics in pediatric environmental health research-part I: genetic and prenatal testing.

    Science.gov (United States)

    Fisher, Celia B

    2006-10-01

    The pressing need for empirically informed public policies aimed at understanding and promoting children's health has challenged environmental scientists to modify traditional research paradigms and reevaluate their roles and obligations toward research participants. Methodologic approaches to children's environmental health research raise ethical challenges for which federal regulations may provide insufficient guidance. In this article I begin with a general discussion of privacy concerns and informed consent within pediatric environmental health research contexts. I then turn to specific ethical challenges associated with research on genetic determinants of environmental risk, prenatal studies and maternal privacy, and data causing inflicted insight or affecting the informational rights of third parties.

  7. EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE

    OpenAIRE

    W. Xian; Y. Chen; J. Chen; X. Luo; H. Shao

    2018-01-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological securi...

  8. Security Techniques for the Electronic Health Records.

    Science.gov (United States)

    Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra

    2017-08-01

    The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.

  9. A bibliography of AECL publications on environmental research

    International Nuclear Information System (INIS)

    Hawley, N.J.

    1978-12-01

    Publications in the open literature on environmental research performed by AECL personnel are listed chronologically with the first entry dated 1951. It is intended that the bibliography should be brought up to date yearly. (author)

  10. Research on Lightweight Information Security System of the Internet of Things

    OpenAIRE

    Ying Li; Li Ping Du; JianWei Guo; Xin Zhao

    2013-01-01

    In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used to verify the legality of access device and to protect the confidentiality and integrity of transform...

  11. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    water. The main challenge is the degradation of water resources which result into siltation that blocks the water sources due to rain while in the dry season the water level in reservoirs goes down. Other challenges include inadequate service coverage, insufficient literacy on climate change, inadequate mitigation measures for water related disasters and inadequate promotion of hygiene and sanitation. Bwaila Secondary School in Malawi is no exception in experiencing inadequate water service coverage amidst opportunities such as availability of relatively abundant water resources, political will, active women and youth. The formal education curriculum in secondary schools has enriched students' knowledge of environmental management in subjects such as Geography, Agriculture and Biology to improve their understanding of natural resource management. However, the primary gap is that students do not use the skills in environmental management acquired from the formal school setting in their day to day life henceforth rendering it to be a mere academic exercise confined within classroom walls. It is against such background that Grassroots Environmental Literacy (GEL), an environmental management social marketing franchise in non-formal education was established to fill in the gap. GEL's mission is to inspire students to become change agents in environmental management in their own lives in both formal and non-formal settings in Malawi. GEL believes that the cultivation of broad-based private and public support is the key to bringing about positive and lasting environmental change hence contributing to water security. The education sector in general and school attendance in particular is largely affected by water security. Furthermore, technological limitations have also affected the accessibility of water resources. UNICEF (2008) asserts that water resources may be scarce as it is capital intensive to sink a bore hole in Malawi. Bwaila secondary school is one of the examples

  12. Human health risk assessment database, "the NHSRC toxicity value database": supporting the risk assessment process at US EPA's National Homeland Security Research Center.

    Science.gov (United States)

    Moudgal, Chandrika J; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  13. Human health risk assessment database, 'the NHSRC toxicity value database': Supporting the risk assessment process at US EPA's National Homeland Security Research Center

    International Nuclear Information System (INIS)

    Moudgal, Chandrika J.; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-01-01

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007

  14. About the Director of EPA's National Health and Environmental Effects Research Laboratory (NHEERL)

    Science.gov (United States)

    Dr. Wayne Cascio serves as Acting Director for the National Health and Environmental Effects Research Laboratory (NHEERL) within the U.S. Environmental Protection Agency's Office of Research and Development (ORD).

  15. Environmental Survey preliminary report, Solar Energy Research Institute, Golden, Colorado

    Energy Technology Data Exchange (ETDEWEB)

    1988-10-01

    This report presents the preliminary findings of the first phase of the Environmental Survey of the US Department of Energy's (DOE) Solar Energy Research Institute (SERI), conducted December 14 through 18, 1987. The Survey is being conducted by an interdisciplinary team of environmental specialists, led and managed by the Office of Environment, Safety and Health's Office of Environmental Audit. The team includes outside experts supplied by private contractors. The objective of the Survey is to identify environmental problems and areas of environmental risk associated with SERI. The Survey covers all environmental media and all areas of environmental regulation. It is being performed in accordance with the DOE Environmental Survey Manual. The on-site phase of the Survey involves the review of existing site environmental data, observations of the operations carried on at SERI, and interviews with site personnel. 33 refs., 22 figs., 21 tabs.

  16. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  17. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  18. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  19. An Unconventional Path Toward the Operational Leveraging of Research-Grade Environmental Satellites

    Science.gov (United States)

    Miller, S.; Hawkins, J.; Turk, J.

    2007-12-01

    The traditional and proper path followed in transitioning research applications to operational support entails a rigorous gamut of quality control, testing, validation, technical documentation, and software optimization. In times of dire need when observations are in high demand and resources are few, however, convention must sometimes give way to outside-of-the-box thinking. Here, considerations made for manageable compromises forge a pathway to accelerated transition of developing technologies. Such was the case in Coalition mobilizations immediately following the 9/11 attacks, when the United States Office of Naval Research issued a challenge to the environmental research and development community to expedite the delivery of any and all capabilities bearing support relevance to mission planners and executors involved in the increasingly likely military response. It was under this directive that the Naval Research Laboratory's (NRL) Satellite Meteorological Applications Section reconfigured its base research program and internal processing infrastructure to effectively transform itself into an agile operational production system for rapid transition of value-added satellite environmental characterization products centered around next-generation 'research grade' satellite observing systems. Integral to this transformation was the coincident establishment of the Near Real-Time Processing Effort (NRTPE) coordinated among members of the National Oceanic and Atmospheric Administration (NOAA), the National Aeronautics and Space Administration (NASA), and Department of Defense (DoD; Air Force and Navy participants) working in a 'badgeless environment'. The NRTPE provided a portal for acquisition of NASA's MODerate resolution Imaging Spectroradiometer (MODIS) data at 2-4 hr latency worldwide. By virtue of NRTPE modifications to the Terra and Aqua satellite telemetry downlinks and transmission across the high-speed Defense Research/Engineering Network, data previously

  20. Database Security: A Historical Perspective

    OpenAIRE

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 ye...