WorldWideScience

Sample records for estonian security culture

  1. Estonian Perceptions of Security: Not Only About Russia and the Refugees

    Directory of Open Access Journals (Sweden)

    Veebel Viljar

    2016-12-01

    Full Text Available The current study focuses on the Estonian perceptions of security and on the defence situation both globally and locally. The dynamic results of the public opinion surveys on security risks conducted in Estonia over the last 10 years (2006-2016 will be presented. In addition, to understand whether some of the security risks could be over- or underestimated in Estonia, these results will be compared with the views expressed recently by the World Economic Forum, particularly the Global Risks Report 2016. Also, the arguments why some topics have played or are currently playing key role in the Estonian security perception will be presented and discussed.

  2. Estonian literature / Janika Kronberg

    Index Scriptorium Estoniae

    Kronberg, Janika, 1963-

    2003-01-01

    Sisu: Estonian literature - born on the margins of Europe ; Baltic German literature and its impact ; Seeking the contours of a 'truly' Estonian literature ; Literature and an independent Estonia ; Estonian literature in two cultural spheres ; The fifties and sixties ; Literature and congealed time ; A bold new Estonian literature

  3. Estonian Perceptions of Security: Not Only About Russia and the Refugees

    OpenAIRE

    Veebel Viljar; Ploom Illimar

    2016-01-01

    The current study focuses on the Estonian perceptions of security and on the defence situation both globally and locally. The dynamic results of the public opinion surveys on security risks conducted in Estonia over the last 10 years (2006-2016) will be presented. In addition, to understand whether some of the security risks could be over- or underestimated in Estonia, these results will be compared with the views expressed recently by the World Economic Forum, particularly the Global Risks R...

  4. Organizational culture based on the example of an Estonian hospital.

    Science.gov (United States)

    Saame, Iisi; Reino, Anne; Vadi, Maaja

    2011-01-01

    The concept of organisational culture (also referred to later as OC) is one of the approaches in modern organisational analysis exploring the values, attitudes and beliefs behind human behaviour in the workplace. OC as a social phenomenon is considered to be important for the sustainability of every organisation. In the service sector, OC may affect the nature and quality of the services provided. The aim of this paper is twofold: on the one hand, to highlight the patterns of OC in a hospital; and, on the other hand, to outline relationships between OC and patient satisfaction. The study was conducted in Tartu University Hospital, one of the most influential health care organisations in Estonia. This paper has original value by presenting an insight into organisational culture in the Estonian health care sector, and the findings of the study will expand knowledge of OC in the health care sector in general. The OC instrument applied in a quantitative cross-sectional study was earlier developed according to the Competing Values Framework (CVF). Data from 456 medical and non-medical professionals were analysed using non-parametric tests of descriptive statistics. A factor analysis was performed to assess the instrument's compatibility for analysing the OC pattern in the health care sector. The dominant culture type in all the groups investigated was the Internal Processes type, mainly followed by the Rational Goal type, while different cultural patterns were observed in professional groups. The factor analysis yielded a three-subscale solution. Clinics with high patient satisfaction did not score more than clinics with low patient satisfaction in terms of the Human Relations type. In future studies a random sample design and a multidisciplinary approach to OC research should be followed in order to further explore OC patterns in hospitals and their consequences for different aspects of hospital performance.

  5. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  6. The Information Culture of Higher Education Institutions: The Estonian Case

    Science.gov (United States)

    Lauri, Liia; Heidmets, Mati; Virkus, Sirje

    2016-01-01

    Introduction: This paper focuses on the information culture of higher education institutions in Estonia. The aim of the study is to explore the relationship between information culture, information management and job satisfaction, leadership style, and self-reported individual performance. Method: A total of 160 faculty members from twelve…

  7. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  8. The Dialogue with Hamlet: Paul-Eerik Rummo’s “Hamlet’s Songs” as an Example of the Existential Paradigm in Estonian Culture

    Directory of Open Access Journals (Sweden)

    Anneli Mihkelev

    2013-06-01

    Full Text Available The article demonstrates different meanings of the motif of Hamlet in the Estonian culture. Hamlet as a literary figure has been very important and influential, a symbol of will and a fighter in a hopeless situation. Paul-Eerik Rummo’s poem “Hamlet’s Songs” (1964 forms the centre around which revolve not only written texts but also many such cultural texts as theatre performances and music, all connected by allusions to Hamlet. Rummo’s poem is one of the most innovative poems from the 1960s in Estonian literature. The generation of the 1960s was influenced by several important contemporary theories, including existentialism. Many young writers systematically undermined the Soviet regime in their works. The use of the motif of Hamlet reveals a similarity between the existential and romantic rebellions. Rummo’s dialogue with Hamlet in his poem expresses optimism in a hopeless situation in a way different from Shakespeare’s.

  9. Peace, Security, Globalisation & Cultural Diplomacy

    Directory of Open Access Journals (Sweden)

    Ashok Natarajan

    2017-06-01

    Full Text Available This article argues for a positive, comprehensive conception of peace that goes beyond the mere absence of war and a more integrated conception of human security that encompasses a wider range of issues than threats of physical violence. Education is one of humanity’s most effective social institutions for redirecting the violent physical energies of destruction into higher avenues of civilization and culture as an instrument of conscious social evolution. Organization is knowledge of higher accomplishment. Organization has the power to vastly accelerate and multiply the potentials of education for the promotion of peace and security. Peace and Security have a mutually reinforcing effect on each other in the sense that peace results in security while security results in peace. Physical violence eventually led to the development of the knowledge needed for the avoidance of violence by means of diplomacy, trade and cultural exchanges, marking the beginning of the transition from the physical to the mental level of evolution. Trade requires travel, transport, human interaction, exchange, trust with respect to products, and reliable mechanisms for the exchange of a stable currency that can only be effectively founded on an enduring peace that generates confidence among the traders. Isolated communities evolve a communal consciousness as they mature into organized social units founded on shared customs and culture, which later develop into a common legal framework. What began as diplomacy so many centuries ago has now evolved into a near universal recognition of fundamental human rights and the rule of law. The evolution of diplomacy in previous centuries is the foundation for the remarkable betterment of human life witnessed in recent times. The world is in the process of evolving a unifying global culture founded on universal values and recognition of the rich contributions of different cultures to humanity’s progress. As physical force once

  10. Safeguards Culture: Analogies from Safety Culture and Security Culture

    International Nuclear Information System (INIS)

    Naito, K.

    2013-01-01

    The terminology of 'safeguards culture' has been used loosely by safeguards experts as an essential element for establishing an organizational environment of stakeholders for the effective and efficient implementation of international safeguards. However, unlike the other two triplet brothers/ sisters of 3S's (Safety, Security, Safeguards), there is no formally established definition of safeguards culture. In the case of safety culture, INSAG (the International Nuclear Safety Advisory Group) has extensively dealt with its concept, elaborating its definition and key characteristics, and published its report, INSAG-4, as the IAEA Safety Series 75. On the other hand, security culture has also been defined by AdSec (the Advisory Group on Nuclear Security). In this paper, a provisional definition of safeguards culture is made on the analogies of safety culture and security culture, and an effort is made to describe essential elements of safeguards culture. It is proposed for SAGSI (the Standing Advisory Group on Safeguards Implementation) to formally consider the definition of safeguards culture and its characteristics. The paper is followed by the slides of the presentation. (author)

  11. Formation of nuclear security culture in Ukraine

    Directory of Open Access Journals (Sweden)

    V. I. Gavryliuk

    2014-06-01

    Full Text Available Issues of nuclear security culture formation are considered in the article. Information on establishing and ac-tivity of Working Group for formation and development of nuclear security culture being held during 2010 – 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is il-lustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development.

  12. Formation of nuclear security culture in Ukraine

    International Nuclear Information System (INIS)

    Gavrilyuk, V.Yi.; Gavrilyuk-Burakova, A.V.; Drapej, S.S.; Parkhomenko, V.V.; Proskuryin, D.V.; Romanova, O.P.

    2014-01-01

    Issues of nuclear security culture formation are considered in the article. Information on establishing and activity of Working Group for formation and development of nuclear security culture being held during 2010 - 2013 is given. An issue of regulation of activity on formation and development of nuclear security culture is illustrated. Analysis of the survey results regarding efficiency assessment of the work aimed to form and develop of nuclear security culture of nuclear facilities is carried out. The results show that the nuclear security culture of the most of nuclear facilities in Ukraine has been formed and is at the stage of development

  13. Eesti patsient. Haiguse ja haige inimese kujutamise mudel 19. sajandi eesti kultuuris ja kirjasõnas. The Estonian Patient: A Model for the Representation of Illness and the Ill in 19th Century Estonian Culture and Letters

    Directory of Open Access Journals (Sweden)

    Janek Kraavi

    2012-04-01

    Full Text Available The portrait of the 18th and 19th century „Estonian patient” sketched in this article is a theoretical model of the ill person, based mainly on literary texts, but with reference to a variety of scientific and popular-scientific material. The point of departure is the classic postcolonial theorist, Frantz Fanon, in whose writings medicine, healing, and discourse on such topics are seen as the functioning of a specific colonial practice. The most notable characteristic of the figure of the Estonian patient is non-communicativeness. Communication is avoided and feared primarily because it has to be directed toward those in higher positions of power, or to institutions that embody power (the apothecary, the hospital. While these traits also characterize the separation between peasants and their rulers more generally, in a situation of illness the exclusion is felt with a double intensity. Sickness casts the peasant in a double bind: when in need of help or healing, contact across the divide between social rank, and – more broadly, between two cultures and ways of understanding the world, becomes unavoidable. In such situations, illness signifies an intensification of the gap in social standing. The ill person, who already stands on a lower rung of the social hierarchy, becomes all the more marginalized. In keeping with these observations, the real reason behind indecisiveness and refusal of medical treatment may well be an effort to avoid or postpone humiliation on the basis of lower social standing. Other contributing factors might include unconscious resistance – or even a conscious model of resistance – in the psyche, which manifests as an avoidance of communication. The content and motivating force for the model is not heroism, but rather a sense of shame. Indeed, behind the context of medical culture lurks ethnic and material isolation. The individual’s economic situation, living conditions, education and – most important – his

  14. Valued Estonian Music CDs

    Index Scriptorium Estoniae

    2004-01-01

    2002. aastal välja antud eesti muusika heliplaatidest Artur Kapp "Symphonische Werke", Eduard Tubin "Symphonies No.9, No.10 and No.11", "Estonian Preludes", "Eesti heliloojad. Hortus Musicus", "Eesti Muusika Päevad", "Tallinn Saxophone Quartet. Estonian Contemporary Music", "Triskele. Kolga-Jaani vaimulikud rahvalaulud", "Helmekaala. Linnupuu Anne", "Modern Fox mängib Raimond Valgret",

  15. Safety, Security and Safeguards (3S) Culture

    International Nuclear Information System (INIS)

    Mladineo, S.V.; Frazar, S.

    2013-01-01

    A meaningful discussion of Safety, Security, and Safeguards (3S) Culture requires a review of the concepts related to the culture of the three components. The concept of culture can be confusing, and so careful use of terminology is needed to enable a focused and constructive dialogue. To this end, this paper will use the concept of organizational culture as a backdrop for a broader discussion about how the three subcultures of safety, security and safeguards come together to enhance the mission of an organization. Since the accidents at Three Mile Island and Chernobyl, the nuclear industry has embraced the concept of safety culture. The work on safety culture has been used to develop programs and concepts in the culture of Material Protection, Control, and Accounting and Nuclear Security Culture. More recently, some work has been done on defining an International Safeguards Culture. Others have spoken about a 3S Culture, but there has been little rigorous consideration of the concept. This paper attempts to address 3S Culture, to begin to evaluate the merit of the concept, and to propose a definition. The paper is followed by the slides of the presentation. (authors)

  16. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  17. Digimodernistlik eesti kirjanik / The Digimodernist Estonian Writer

    Directory of Open Access Journals (Sweden)

    Piret Viires

    2013-06-01

    Full Text Available The article examines the cultural situation following postmodernism in the first decade of the 21st century. To characterise this situation, the umbrella term “post-postmodernism” is used, as well as “neomodernism”, “altermodern”, “metamodernism”, “hypermodernity”, “performatism”, “critical realism” etc. All these approaches are, in a wider sense, united by their aim of opposing postmodernist cynicism and irony, and bringing back truth, simplicity and clarity. It has also been found that literature has returned or is returning to realism, and various cultural phenomena are emerging, which have been designated by the concept “new sincerity”.In descriptions of the current cultural situation, this trend seeking truth and simplicity is supported by approaches which emphasise the significance of technological developments during the last decade. A prominent figure here is Alan Kirby, who launched the term “digimodernism”, mainly linked with the adaptation and spread of Web 2.0 at the beginning of the 21st century: the blogosphere, Wikipedia, Twitter and Facebook.The article seeks answers to the question of whether we can talk about digimodernism in Estonian literature in the 2000s. In the 1990s Estonian writers were quite reluctant to undertake computer-technological experiments, and there are only a few examples of Estonian digital literature, whereas a change occurred in the 2000s. Many Estonian writers have had and still have their own blogs and surprisingly many have joined Facebook. The term “twitterature” is also familiar to Estonian writers. The article tackles the dominant topics in the blogs of Estonian writers and analyses their possible collective creative work on Facebook. A question is raised as to whether it is possible that the fragmentary narrative structure of blogs and Facebook has influenced mainstream literature.The article concludes that one essential change in Estonian literature in the

  18. Field of genes: the politics of science and identity in the Estonian Genome Project.

    Science.gov (United States)

    Fletcher, Amy L

    2004-04-01

    This case study of the Estonian Genome Project (EGP) analyses the Estonian policy decision to construct a national human gene bank. Drawing upon qualitative data from newspaper articles and public policy documents, it focuses on how proponents use discourse to link the EGP to the broader political goal of securing Estonia's position within the Western/European scientific and cultural space. This dominant narrative is then situated within the analytical notion of the "brand state", which raises potentially negative political consequences for this type of market-driven genomic research. Considered against the increasing number of countries engaging in gene bank and/or gene database projects, this analysis of Estonia elucidates issues that cross national boundaries, while also illuminating factors specific to this small, post-Soviet state as it enters the global biocybernetic economy.

  19. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  20. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  1. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. A study on the promotion of nuclear security culture

    International Nuclear Information System (INIS)

    Tamai, Hiroshi; Tazaki, Makiko; Kokaji, Lisa; Shimizu, Ryo; Suda, Kazunori

    2015-01-01

    In recent years the promotion of nuclear security culture aiming at strengthening nuclear security is extensively mentioned, however, awareness of nuclear security culture seems to be not much high compared to the permeation of nuclear safety culture. As a world's leading country of peaceful nuclear use, permeation of nuclear security culture into various social classes must be one of important issues in Japan. Learning from the TEPCO Fukushima Daiichi nuclear power plant accident, complementarity between nuclear safety and nuclear security in the aspect of both protection measures has been profoundly recognised. Therefore, it will be natural to promote nuclear security culture modelled on the preceding nuclear safety culture. On this standpoint, the paper examines an approach for the promotion of nuclear security culture which, for example, consists of awareness cultivation, attitude progress, permeation assessment, and resulting in the establishment of PDCA Cycle. (author)

  3. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  4. Security Culture in Physical Protection of Nuclear Material and Facility

    International Nuclear Information System (INIS)

    Susyanta-Widyatmaka; Koraag, Venuesiana-Dewi; Taswanda-Taryo

    2005-01-01

    In nuclear related field, there are three different cultures: safety, safeguards and security culture. Safety culture has established mostly in nuclear industries, meanwhile safeguards and security culture are relatively new and still developing. The latter is intended to improve the physical protection of material and nuclear facility. This paper describes concept, properties and factors affecting security culture and interactions among these cultures. The analysis indicates that anybody involving in nuclear material and facility should have strong commitment and awareness of such culture to establish it. It is concluded that the assessment of security culture outlined in this paper is still preliminary for developing and conduction rigorous security culture implemented in a much more complex facility such as nuclear power plant

  5. Estonian Tax Structure

    Directory of Open Access Journals (Sweden)

    Viktor Trasberg

    2014-08-01

    Full Text Available The paper analyses Estonian tax structure changes during the last decade and critically assesses the current situation. The country’s tax mix is rather unique among EU countries – it has one of the highest proportions of consumption taxes in total taxes and the lowest level of capital and profit taxes. Such an unbalanced tax structure creates risks for public finances, limits revenue collection and distorts the business environment.

  6. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  7. Organizational Commitment in Estonian University Libraries: A Review and Survey

    Science.gov (United States)

    Kont, Kate-Riin; Jantson, Signe

    2014-01-01

    The data used in this article is based on the reviewing of relevant literature to provide an overview of the concepts of organizational commitment, job security, and interpersonal relations, as well as on the results of the original online survey, conducted by the article's authors, held in 2012 in Estonian university libraries governed by public…

  8. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  9. Three Modes of Thinking and Policy Orientation of Cultural Security

    Institute of Scientific and Technical Information of China (English)

    LIU Yuejin; Wang Xuege

    2016-01-01

    Three types of relations are entangled nowadays in dealing with issues conceming national cultural security on both the theoretical and practical levels:(1) the relation between one's own culture and that of other ethnic groups;(2) the relation between advanced and underdeveloped parts of culture;(3) the relation between one's ethnic culture and so-called foreign advanced culture as related to the previous two.Accordingly,three modes of thinking are likely adopted in handling issues concerning national cultural security:to antagonize one's own culture with that of other ethnic groups,that is,taking the "me or you" attitude;to dualize cultures as the "advanced" and the "underdeveloped",that is,believing things to be good if not bad,or vice versa;and to assert that the ethnic are the advanced,that is,taking the "only-megood" stance.It is a very demanding job to maintain national culture and to pursue cultural development at the same time.Only when cultures are grouped into those without distinction between the advanced and the underdeveloped and those with such distinction can the relation between the ethnic and the advanced be properly handled.With the former,it is essential to maintain the ethnicity of one's own culture before the cultural security is safeguarded.With the latter,however,the pursuit of advanced cultures and the advocacy of the advanced part of a particular culture is a key to ensuring and safeguarding the national cultural security.Hence,it is important to enhance the public awareness of cultural security,and more essentially for the government to offer scientifically appropriate orientation towards cultural security and to frame related policies.

  10. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  11. Estonian energy forest project

    International Nuclear Information System (INIS)

    Koppel, A.; Kirt, E.; Kull, K.; Lasn, R.; Noormets, A.; Roostalu, H.; Ross, J.; Ross, V.; Sulev, M.

    1994-04-01

    In February 1993 an agreement of Swedish-Estonian scientific co-operation on energy forest was signed. In may five energy forest plantations (altogether 2 ha) were established in Estonia with Swedish selected clones of Salix viminalis and Salix dasyclados. The research within this project is carried out within three main directions. The studies of basic ecophysiological processes and radiation regime of willow canopy will be carried out in Toravere. The production ecology studies, comparison of the productivity of multiple clones on different soil types is based on the plantations as vegetation filter for wastewater purification is studied on the basis of plantations in Vaeike-Maarja and Valga (author)

  12. Estonian Airi uued soodsad pakkumised

    Index Scriptorium Estoniae

    2010-01-01

    Estonian Airi kodulehelt on võimalik osta lennupileteid koostööpartnerite poolt pakutavatele mandritevahelistele lendudele ning broneerida internetis hotellituba Euroopa suurima hotelli broneerimise teenust pakkuva ettevõtte Booking.com kaudu

  13. Building Nuclear Safety and Security Culture Within Regulatory Body

    International Nuclear Information System (INIS)

    Huda, K.

    2016-01-01

    To achieve a higher level of nuclear safety and security, it needs to develop the safety and security culture not only in the facility but also in the regulatory body. The regulatory body, especially needs to develop the safety and security culture within the organization, because it has a function to promote and oversee the culture in the facilities. In this sense, the regulatory body should become a role model. Development of the nuclear safety and security culture should be started by properly understanding its concept and awakening the awareness of individual and organization on the importance of nuclear safety and security. For effectiveness of the culture development in the regulatory body, the following steps are suggested to be taken: setting up of the regulatory requirements, self-assessment, independent assessment review, communication with the licensee, oversight of management system implementation, and integration with regulatory activities. The paper discusses those steps in the framework of development of nuclear safety and security culture in the regulatory body, as well as some important elements in building of the culture in the nuclear facilities. (author)

  14. [Mati Erelt. Estonian Language] / Katrin Hiietamm

    Index Scriptorium Estoniae

    Hiietamm, Katrin

    2004-01-01

    Arvustus: Estonian language / [Estonian Academy of Sciences] ; edited by Mati Erelt.Tallinn : Teaduste Akadeemia Kirjastus, 2003. 412, [1] lk. : ill., kaart. (Linguistica Uralica. Supplementary series, 0868-4731 ; vol. 1)

  15. Information security as part of the nuclear safety culture

    Energy Technology Data Exchange (ETDEWEB)

    Sitnica, A., E-mail: demetrkj@westinghouse.com [Westinghouse Electric Co., 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2016-09-15

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  16. Information security as part of the nuclear safety culture

    International Nuclear Information System (INIS)

    Sitnica, A.

    2016-09-01

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  17. A case for societal digital security culture

    NARCIS (Netherlands)

    Ben Othmane, L.; Weffers, H.T.G.; Ranchal, R.; Angin, P.; Bhargava, B.; Mohamad, M.M.; Janczewski, L.J.; Wolfe, H.B.; Shenoi, S.

    2013-01-01

    Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems could cause financial losses, privacy/safety compromises, and operational interruptions.

  18. Estonian wind climate

    International Nuclear Information System (INIS)

    Kull, Ain

    1999-01-01

    Estonia is situated on the eastern coast of the Baltic Sea. This is a region with intensive cyclonic activity and therefore with a relatively high mean wind speed. Atmospheric circulation and its seasonal variation determine the general character of the Estonian wind regime over the Atlantic Ocean and Eurasia. However, the Baltic sea itself is a very important factor affecting wind climate, it has an especially strong influence on the wind regime in costal areas. The mean energy density (W/m 2 ) is a wind energy characteristic that is proportional to the third power of wind speed and describes energy available in a flow of air through a unit area. The mean energy density is a characteristic which has practical importance in regional assessment of snowdrift, storm damage and wind energy

  19. Security culture: One for all, and all for one

    International Nuclear Information System (INIS)

    Gaspar, Milos

    2016-01-01

    Preventing the theft of nuclear material and attacks and sabotage against nuclear installations is a challenge that governments, nuclear regulators and operators around the world are increasingly facing. “Terrorism is a real threat that exists around the world and also in Indonesia. And it can affect nuclear security,” said Khairul Khairul, a senior nuclear security officer at Indonesia’s National Nuclear Energy Agency (BATAN), which operates three research reactors. “We need to strengthen the notion of nuclear security in our entire workforce by developing a strong nuclear security culture.”

  20. National security through the preservation and development of cultural sphere

    Directory of Open Access Journals (Sweden)

    Malakshinova N.Sh.

    2016-10-01

    Full Text Available matters of national security in the context of the inextricable interrelationship and interdependence of national security and socio-economic development are presented in the article. The particular attention is paid to the legislative consolidation of security categories, the system of national security elements, and changes in the domestic legislation updates. Therefore, safety, a list of national interests, highlighted by long-term perspective, and questions about the means of implementation of strategic national priorities, including the named culture as a sphere of life are very important. Sphere of culture as a national priority and an important factor in the quality of life growth and harmonization of public relations, collateral dynamic socio-economic development and the preservation of a common cultural space and sovereignty of Russia are studied more detailed.

  1. Nuclear security culture in comparison with nuclear safety culture. Resemblances and differences

    International Nuclear Information System (INIS)

    Kawata, Norio

    2015-01-01

    Since the terrorist attacks on the U.S. on September 11th, 2001, Nuclear Security has been focused on and treated as a global issue in the international community and it has also been discussed as a real and serious threat to nuclear power plants in the world since 'The Great East Japan Earthquake' in March, 2011. The International Atomic Energy Agency (IAEA) issued a document including Nuclear Security Recommendations (INFCIRC/225/Rev.5) (NSS 13) in the Nuclear Security Series and emphasized the necessity of fostering Nuclear Security Culture. Nuclear Security Culture has been frequently discussed at various kinds of seminars and events. Since the officials in charge of Nuclear Security are familiar with the area of Nuclear Safety, the relationships between Nuclear Safety Culture and Nuclear Security Culture have been the point in controversy. This paper clarifies relevance between Nuclear Safety and Security, considers resemblances and differences of their concepts and lessons learned for each culture from nuclear power plant accidents, and promotes deeper understanding of Nuclear Safety and Nuclear Security Culture. (author)

  2. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  3. Estonian white paper on energy

    International Nuclear Information System (INIS)

    Hamburg, Arvi

    1997-01-01

    Energy policy, environmental protection and economy form a triangle of tightly linked sectors, and any solution of some energy problem can be solved only in the light of all the above mentioned factors. There are several energy master plans for Estonia, the first of them dating back to the years of the Soviet Union and ending the list with the plan to cover the years up to 2000. By now the basic principles of the Estonian energy policy have been prepared and Estonian Energy Concept is being worked out. The main goal of Estonian energy policy is ensure an effective and environmentally benign energy supply for the country. It means safety in energy supply, effective production and supply together with sufficient environmental protection. Energy Council in the role of an advisory voluntary organization for inspection of the energy system and finding measures to improve its efficiency is established with parliament members included. The Estonian Energy Research Institute and the Oil--Shale Research Institute serve as a scientific advisory board for the government in energy policy. It's important to emphasise that privatisation is no panacea, solving all the problems, and therefore we are facing hard to move in the right direction, satisfying all the consumers of energy

  4. Logistics in Estonian business companies

    Directory of Open Access Journals (Sweden)

    A. Kiisler

    2008-12-01

    Full Text Available The article describes logistics survey in Estonia carried out in 2007 as a part of the LogOnBaltic project. The level of logistics in Estonian manufacturing, trading and logistics companies is explored through logistics costs, performance indicators, outsourcing, ICT use and logistics self-estimation of the companies responded. Responses from 186 Estonian companies were gathered through a web-based survey (38% of manufacturing, 38% of trading and 24% of logistics sector. Logistics costs as the percentage of turnover make in average 13.8% in manufacturing and 13.3% in trading. Transportation and inventory carrying cost form around 70% of overall logistics costs. Considering the logistics indicators surveyed, Estonian companies show up with relatively low perfect order fulfillment rates, short customer order fulfillment cycles and effective management of cash flows. The most widely outsourced logistics function is international transportation followed by domestic transportation, freight forwarding and reverse logistics. By 2010, the outsourcing of IT systems in logistics followed by inventory management, warehousing and product customization is expected to increase more substantially. The awareness of logistics importance is still low among Estonian companies. Only 27–44% of those agree that logistics has a considerable impact on profitability, competitive advantage, top management or customer service level.

  5. Seltsi muuseumist riigi keskmuuseumiks: ikka ajutiste lahendustega / Changes in the Estonian National Museum from 1909 to the present.

    Directory of Open Access Journals (Sweden)

    Krista Aru

    2011-01-01

    Full Text Available Changes in the Estonian National Museum from 1909 to the presentThe Estonian National Museum was founded in Tartu in 1909 as part of the national movement. With its activities and connections in society, the ENM helped create Estonian society, the nation’s collective memory and identity.The ENM has always been – despite the changing locations, names, and content – one of the symbols of national identity. But at the same time, ENM has never had its own building designed specially for the museum’s purposes.Since 1909 there have been several attempts to establish a home for the ENM. At first (1909–1923, Estonian society wanted to establish the museum in the center of Tartu. The museum was intended to become a key institution of the growing nation and establishing the nation’s identity.At last in 1923 the ENM secured the Raadi manor, outside the center of the city, in a beautiful park, near the lake with its boats and water attractions. In this manor the first permanent exhibition of mainly 19th century Estonian peasant life was compiled, and the ENM operated in the Raadi manor from 1923–1940 as the “Estonian’s own museum” The years of alternating occupations, World War II, and political terror damaged and destroyed the whole society. The Raadi manor was destroyed in the war too, and the ENM itself was divided into two parts – the State Ethnographic Museum and the State Literary Museum. The collections of the ENM were given to Tallinn and to many different places inside and outside Tartu. Then began “the period of temporary location” that continues today. The museum is located in several places in the city of Tartu.In 1988, the prior name of the State Ethnographic Museum – the Estonian National Museum – was reinstated. Since the 1990s there have been many attempts to secure a special building for the ENM. Now, at last, as a result of serious economic pressure, we are closer to this goal than ever. During the last five

  6. On the System of Place Name Signs in Estonian Sign Language

    Directory of Open Access Journals (Sweden)

    Liina Paales

    2011-05-01

    Full Text Available A place name sign is a linguistic-cultural marker that includes both memory and landscape. The author regards toponymic signs in Estonian Sign Language as representations of images held by the Estonian Deaf community: they reflect the geographical place, the period, the relationships of the Deaf community with hearing community, and the common and distinguishing features of the two cultures perceived by community's members. Name signs represent an element of signlore, which includes various types of creative linguistic play. There are stories hidden behind the place name signs that reveal the etymological origin of place name signs and reflect the community's memory. The purpose of this article is twofold. Firstly, it aims to introduce Estonian place name signs as Deaf signlore forms, analyse their structure and specify the main formation methods. Secondly, it interprets place-denoting signs in the light of understanding the foundations of Estonian Sign Language, Estonian Deaf education and education history, the traditions of local Deaf communities, and also of the cultural and local traditions of the dominant hearing communities. Both perspectives - linguistic and folkloristic - are represented in the current article.

  7. Developing the security culture at the SEISMED Reference Centres.

    Science.gov (United States)

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  8. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  9. A study on the development of national guide for implementing nuclear security culture in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs.

  10. Self-Assessment of Nuclear Security Culture in Facilities and Activities. Technical Guidance

    International Nuclear Information System (INIS)

    2017-01-01

    The IAEA has developed a comprehensive methodology for evaluating nuclear security culture. When implemented by a State, this methodology will help to make nuclear security culture sustainable. It will also promote cooperation and the sharing of good practices related to nuclear security culture. This publication is the first guidance for assessing nuclear security culture and analysing its strengths and weaknesses within a facility or activity, or an organization. It reflects, within the context of assessment, the nuclear security culture model, principles and criteria set out in the Implementing Guide, IAEA Nuclear Security Series No. 7. This guidance will be useful for organizations and operating facilities in conducting the self-assessment of nuclear security culture by providing practical methods and tools. It will also help regulatory bodies and other competent authorities to understand the self-assessment methodology used by operators, encourage operators to start the self-assessment process or, if appropriate, conduct independent assessments of nuclear security culture.

  11. Migration, citizenship and cultural security: Case of Polish Immigrants in Reykjavik

    Directory of Open Access Journals (Sweden)

    Monika Nowicka

    2014-06-01

    Full Text Available The aim of this article is to analyze cultural security from the micro and meso perspective of immigrants. The paper covers following issues: cultural security in migration context, cultural citizenship, description of Polish diaspora in Reykjavik in the context of cultural activities and Icelandic support for immigrants’ cultural security. The article is based on researches carried out in Reykjavik in 2010 and in 2014 and on a desk research carried out in May 2014.

  12. Compiling the Dictionary of Word Associations in Estonian: From scratch to the database

    Directory of Open Access Journals (Sweden)

    Ene Vainik

    2018-04-01

    Full Text Available The present paper describes the project titled “The Dictionary of Word Associations in Estonian” undertaken by the author at the Institute of the Estonian Language. The general aim of the Dictionary is to provide insights into Estonians’ common-sense mind. It is meant to be a tool of self-reflection for Estonian native speakers and a guide for the foreigners who are eager enough to make themselves familiar with the Estonian cultural patterns of thought. The Dictionary will be published online. The number of keywords was initially limited to approximately 800. Specific emphasis is given to the stage of data collection by implementing the principles of citizen science.

  13. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  14. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  15. Nuclear safety and security culture - an integrated approach to regulatory oversight

    International Nuclear Information System (INIS)

    Tronea, M.; Ciurea Ercau, C.

    2013-01-01

    The paper presents the development and implementation of regulatory guidelines for the oversight of safety and security culture within licensees organizations. CNCAN (the National Commission for Nuclear Activities of Romania) has used the International Atomic Energy Agency (IAEA) attributes for a strong safety culture as the basis for its regulatory guidelines providing support to the reviewers and inspectors for recognizing and gathering information relevant to safety culture. These guidelines are in process of being extended to address also security culture, based on the IAEA Nuclear Security Series No. 7 document Nuclear Security Culture: Implementing Guide. Recognizing that safety and security cultures coexist and need to reinforce each other because they share the common objective of limiting risk and that similar regulatory review and inspection processes are in place for nuclear security oversight, an integrated approach is considered justified, moreover since the common elements of these cultures outweigh the differences. (authors)

  16. An empirical investigation to analysis the dimensions of cultural security: A case study of educational system

    Directory of Open Access Journals (Sweden)

    Elyas Nouraei

    2013-02-01

    Full Text Available The purpose of this study is to explore the concept of cultural security and its practical implications in a case study of educational system. There are several definitions of culture, which describe different aspects of cultural security. In fact, cultural security tends to show various behaviors, thinking, beliefs and other people’s perspectives in a society, which represents the overall circumstances. Cultural security and its issues make it possible to have a clear image of a society or community. This paper aims to identify the important dimensions of cultural security in terms of basic components of cultural security identified in a framework. Therefore, after identifying the components, using a questionnaire, required data are gathered from the universities of the city of Ilam, Iran and they are analyzed by SPSS18.0 software and its appropriate statistical tests.

  17. Consumer Socialisation and Value Orientations among Estonian and Chinese Young People

    Science.gov (United States)

    Waerdahl, Randi; Kalmus, Veronika; Keller, Margit

    2011-01-01

    This paper asks if Estonian and Chinese tweens' access to pocket money influences their brand valuation, as well as value orientations in the context of perceived peer popularity and personal well-being. Surveys conducted in autumns 2006 (China n = 188) and 2007 (Estonia n = 111) show an inherent cultural resistance among tweens in both countries…

  18. Estonian Air to overhaul strategy / Matt Withers

    Index Scriptorium Estoniae

    Withers, Matt

    2008-01-01

    Estonian Air on majanduslikes raskustes, mida aitaks leevendada riigipoolne toetus. Majandus- ja kommunikatsiooniminister Juhan Parts leiab, et riik peaks omama lennufirma juhatuses esimehe kohta, et mõjutada rohkem vastuvõetavaid otsuseid ja investeeringuid

  19. Estonian Golf & Country Club / Urmas Oja

    Index Scriptorium Estoniae

    Oja, Urmas, 1981-2012

    2005-01-01

    Konkursil "Eesti parim puitehitis 2005" pälvis voodrilaua eripreemia Jõelähtme Estonian Golf & Country Club'i katus. Arhitekt Andres Siim. Sisearhitekt Juta Lember. Konstruktor: AS Resand. 11 värv. ill

  20. Estonian Air / Kirsti Vainküla

    Index Scriptorium Estoniae

    Vainküla, Kirsti, 1972-

    2004-01-01

    Estonian Air reklaamib end Taani linna Aalborgi raadiojaama ilmateates. Lennukompanii pressiesindaja Epp Alatalu sõnul on firma Taanis reklaamimise põhjus see, et liinil Tallinn-Kopenhaagen sõitjate hulgas ei ole peaaegu üldse taanlasi

  1. On the System of Person-Denoting Signs in Estonian Sign Language: Estonian Name Signs

    Science.gov (United States)

    Paales, Liina

    2010-01-01

    This article discusses Estonian personal name signs. According to study there are four personal name sign categories in Estonian Sign Language: (1) arbitrary name signs; (2) descriptive name signs; (3) initialized-descriptive name signs; (4) loan/borrowed name signs. Mostly there are represented descriptive and borrowed personal name signs among…

  2. Culture, Structure and Leadership Impacts on Gender Inclusion in the Security Sector

    Science.gov (United States)

    2017-09-01

    Culture, structure and leadership impacts on gender inclusion in the security sector 1 DANIEL K. INOUYE ASIA PACIFIC CENTER FOR SECURITY...STUDIES OCCASIONAL PAPER, SEPTEMBER 2017 Culture, structure and leadership impacts on gender inclusion in the security sector Canyon DV Abstract...Depending on your perspective, the primary challenge to gender inclusion is either culture, structure or leadership . The good news is that they are all

  3. The role of national security culture in crisis management : the case of Kardak crisis

    OpenAIRE

    Savaş, Özlem

    2008-01-01

    Ankara : The Department of International Relations, Bilkent University, 2008. Thesis (Master's) -- Bilkent University, 2008. Includes bibliographical references leaves 94-103. This thesis analyzes the role of national security culture in crisis management. The use and significance of national security culture in the management of a crisis is the main concern discussed throughout this study. It is assumed that national security culture serves as the main guideline of states d...

  4. Air Baltic: Estonian Air on nurka surutud / Teele Tammeorg

    Index Scriptorium Estoniae

    Tammeorg, Teele

    2010-01-01

    Air Balticu asepresidendi Janis Vanagsi hinnangul on Estonian Air aastaid jätnud tähelepanuta oma peamised turismiturud ning on praegu halvas seisus. Air Baltic on endiselt huvitatud Estonian Airi ostust. Majandus- ja kommunikatsiooniminister Juhan Partsi seisukoht

  5. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available The information society is increasingly more dependent on Information Security Management Systems (ISMSs, and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMSs that have been adapted to their special features, and which are optimized as regards the resources needed to deploy and maintain them. This article shows how important the security culture within ISMSs is for SMEs, and how the concept of security culture has been introduced into a security management methodology (MARISMA is a Methodology for “Information Security Management System in SMEs” developed by the Sicaman Nuevas Tecnologías Company, Research Group GSyA and Alarcos of the University of Castilla-La Mancha. for SMEs. This model is currently being directly applied to real cases, thus allowing a steady improvement to be made to its implementation.

  6. The Globalization of Higher Education as a Societal and Cultural Security Problem

    Science.gov (United States)

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  7. On China’s Social Security System and Traditional Chinese Culture

    Institute of Scientific and Technical Information of China (English)

    谢浙

    2017-01-01

    This paper explores the interrelation between China’s social security system and traditional Chinese culture, pointing out the meaning of the study, and that China’s social security system is a carrier and representation of traditional Chinese culture and

  8. Methodology for considering environments and culture in developing information security systems

    OpenAIRE

    Mwakalinga, G Jeffy; Kowalski, Stewart; Yngström, Louise

    2009-01-01

    In this paper, we describe a methodology for considering culture of users and environments when developing information security systems. We discuss the problem of how researchers and developers of security for information systems have had difficulties in considering culture of users and environments when they develop information security systems. This has created environments where people serve technology instead of technology serving people. Users have been considered just as any other compo...

  9. Stocks of organic carbon in Estonian soils

    Directory of Open Access Journals (Sweden)

    Kõlli, Raimo

    2009-06-01

    Full Text Available The soil organic carbon (SOC stocks (Mg ha–1 ofautomorphic mineral (9 soil groups, hydromorphic mineral (7, and lowland organic soils (4 are given for the soil cover or solum layer as a whole and also for its epipedon (topsoil layer. The SOC stocks for forest, arable lands, and grasslands and for the entire Estonian soil cover were calculated on the basis of the mean SOC stock and distribution area of the respective soil type. In the Estonian soil cover (42 400 km2, a total of 593.8 ± 36.9 Tg of SOC is retained, with 64.9% (385.3 ± 27.5 Tg in the epipedon layer (O, H, and A horizons and 35.1% in the subsoil (B and E horizons. The pedo-ecological regularities of SOC retention in soils are analysed against the background of the Estonian soil ordination net.

  10. Considerations on a concept of nuclear security culture and its development

    International Nuclear Information System (INIS)

    Miyamoto, Naoki

    2013-01-01

    In March 2012, domestic regulations regarding physical protection measures of nuclear facilities were amended to strengthen those measures. By these amendments, nuclear operators were requested to stipulate their corporate system to develop nuclear security culture on their physical protection plans, and therefore, attention has been drawn on a concept of nuclear security culture and its development. In the light of these situations, this presentation will consider the concept of nuclear security culture and its development. Firstly, focusing attention on 'culture', a concept of 'corporate culture' which is emphasized in corporate management will be analyzed. Then, with reference to 'safety culture', elements that seems to correspond to the concept of nuclear security culture will be extracted. Secondly, particularizing a 'corporate system to develop nuclear security culture', by reviewing a notion of 'Corporate Social Responsibility (CSR)' which attracts lots of attention recent years in terms of corporate sustainable development, results of examination regarding commitment structure of corporate chief executive and corporate risk management framework, which are considered to be efficient for the development of nuclear security culture, will be reported. (author)

  11. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  12. Culture of socio-economic security of Ukraine: Challenges in XXIst Century

    Directory of Open Access Journals (Sweden)

    Olesya Ihorivna Datsko

    2015-12-01

    Full Text Available It is argued, that the culture of social- economic security has impact on the socio-economic development of state. It is formed at several levels of human interaction: with oneself, other people, work, environment, community groups, state, world, God. It is proved that low level of culture of socio-economic security of Ukraine's population, especially state leaders has a destructive effect on the economic development, labour potential, and increasing level of corruption. The necessity to develop a culture of social- economic security in the state economic policy is proved.

  13. Valued Estonian Music CDs / Igor Garshnek

    Index Scriptorium Estoniae

    Garšnek, Igor, 1958-

    2003-01-01

    2002. aastal välja antud eesti muusika heliplaatidest Arvo Pärt "Summa", Lepo Sumera "Chamber Music", "Baltic Voices 1.", "Sequenzen - Europäische Orgelmusik des 20. Jahrhundrets mit...", "El silenco ئ Silence. Kuldar and Marje Sink. Songs of Mother and Son", "Riho Sibul. Estonian Dream Big Band", "Rull's Royce ئ Rull's Choice"

  14. Resource and utilization of Estonian hydropower

    International Nuclear Information System (INIS)

    Raesaar, P.

    2005-01-01

    An overview of the Estonian hydropower resources and their utilization at present as well as prospective for the future are presented in this paper. A short overview of advantages of small hydropower stations and related issues is given. Some technological aspects are treated briefly. (authors)

  15. Transformational Leadership in the Estonian Defence Forces

    Directory of Open Access Journals (Sweden)

    Antek Kasemaa

    2015-06-01

    Full Text Available Purpose – The study is a contribution to the validation of the 15 items and 5 subscales Transformational Leadership Scale (TLS proposed by Rafferty and Griffin (2004. Design/methodology/approach – The sample includes participants from different levels of the Estonian Defence Forces (EDF military hierarchy (N=2570. The structure of the TLS was examined by using exploratory and confirmatory factor analyses. Additionally ANOVA was used to compare the results between different subsamples. Findings – TLS showed satisfactory reliability. Confirmatory factor analyses found TLS as valid five dimensions instrument to measure transformational leadership in the Estonian military context. Different management levels showed different emphases among the dimensions of transformational leadership. Research and practical limitations/implications – TLS will be an important tool to use in transformational leadership research in the Estonian military context and beyond. Additionally, the current research contributes to the development of alternative measurement tools besides the most commonly used MLQ. The limitation of the work will be the rather homogenous sample from the Estonian military, however it will open the door for the subsequent research using different samplings. Originality/value – The current research found TLS to be a reliable and valid instrument, very short and therefore easy to administrate, having the possibility to use it with five dimensional and as one general transformational instrument as well.

  16. Noor eesti teater ja Noor-Eesti. Young Estonian Theatre and Young Estonia

    Directory of Open Access Journals (Sweden)

    Katri Aaslav-Tepandi

    2012-04-01

    Full Text Available This article begins by examining points of intersection between two professional theatres, ”Estonia” and ”Vanemuine” (both established in 1906, their young directors – Karl Menning, Paul Pinna, Theodor Altermann, and Karl Jungholz, and the literary movement Young Estonia. Subsequently, we will consider Young Estonia’s theatrical ideals and the influence of these ideas on later Estonian theatrical life. Since not much information has survived regarding direct personal contacts between ”movers and shakers” in the theatre world and Young Estonians, the main focus here shall be on indirect creative connections and influences. One such context is education: like the Young Estonians, theatre activists of the younger generation aspired to place themselves on the larger map of European culture. Thus, their artistic beliefs and goals shall be examined in relation to those of Young Estonians’ quest for modern culture. Pinna, Altermann, Menning, Jungholz, and others went on study tours to Germany and France, where they were energized and inspired by innovative German and Russian theatres, by naturalistic staging, and by psychological realism, both in acting and in performance style. Among their models were A. Antoine’s Théâtre- Libre in Paris, K. Stanislavski’s Art Theatre in Moscow, O. Brahm’s Lessing-Theater, and M. Reinhardt’s Deutsches Theater in Berlin. These models were likewise known to the Young Estonians, but if theatre activists oriented themselves more fundamentally to German naturalist and realist dramatic art, Young Estonians were more taken with ”theatrical theatre” with its symbolist and impressionist influences. The Young Estonians attended performances at both theatres, ”Vanemuine” and ”Estonia”, and wrote numerous theatre reviews. Yet in the Young Estonia albums (yearbooks and in the magazine Young Estonia, theatre topics have a relatively modest representation. Young Estonians did not have direct

  17. Swedish-Estonian energy forest research cooperation

    International Nuclear Information System (INIS)

    Ross, J.; Kirt, E.; Koppel, A.; Kull, K.; Noormets, A.; Roostalu, H.; Ross, V.; Ross, M.

    1996-01-01

    The Organization of Estonian energetic economy is aimed at cutting the usage of oil, gas and coal and increasing the local resources firewood, oil-shale and peat for fuel. The resources of low-valued firewood-brushwood, fallen deadwood etc. are available during the following 10-15 years, but in the future the cultivation of energy forest (willow) plantations will be actual. During the last 20 years the Swedish scientists have been extensively studying the willow forest selection, cultivation and use in energetics and waste water purification systems. A Swedish-Estonian energy forest research project was started in 1993 between the Swedish Agricultural University on one hand and Toravere Observatory, Institute of Zoology and Botany, Estonian Academy of Sciences and Estonian Potato Processing Association on the other hand. In spring 5 willow plantations were established with the help of Swedish colleagues and obtained from Sweden 36000 willow cuttings. The aim of the project: a) To study experimentally and by means of mathematical modelling the biogeophysical aspects of growth and productivity of willow plantations in Sweden and Estonian climatological conditions. b) To study the possibility of using the willow plantations in waste waters purification. c) To study the economical efficiency of energy forest as an energy resource under the economic and environmental conditions of Estonia. d) To study the economic efficiency of willow plantations as a raw material for the basket industry in Estonia. e) To select the most productive and least vulnerable willow clones for practical application in energy plantations. During 1993 in all five plantations detailed analysis of soil properties has been carried out. In the plantation at Toravere Observatory phytometrical measurements were carried out - the growth of plant biomass leaf and stem area, vertical distribution of dry matter content, biomass and phyto area separately for leaves and stems has been performed. Some

  18. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  19. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  20. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  1. Nuclear Safety and Security Culture Within the Regulatory Body in Romania

    International Nuclear Information System (INIS)

    Tronea, M.

    2016-01-01

    The paper (poster) presents the activities implemented in the Nuclear Fuel Cycle Division of CNCAN (National Commission for Nuclear Activities Control) for promoting nuclear safety and security culture. (author)

  2. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  3. Culture: protection, safety and security connections toward good practices

    International Nuclear Information System (INIS)

    Rozental, Jose Julio

    2005-01-01

    This paper discusses concepts and connections on Protection, Safety and Security, considering many IAEA recent documents and international congress on the subject and basic regulation recommendation to developing countries toward the establishment of adequate capacity to deal with

  4. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  5. Culturing Security System of Chemical Laboratory in Indonesia

    OpenAIRE

    Pusfitasari, Eka Dian

    2017-01-01

    Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and...

  6. Critical Conversations and the Role of Dialogue in Delivering Meaningful Improvements in Safety and Security Culture

    International Nuclear Information System (INIS)

    Brissette, S.

    2016-01-01

    Significant scholarship has been devoted to research into safety culture assessment methodologies. These focus on the development, delivery and interpretations of safety culture surveys and other assessment techniques to assure reliable outcomes that provide insights into the safety culture of an organization across multiple dimensions. The lessons from this scholarship can be applied to the emerging area of security culture assessments as the nuclear industry broadens its focus on this topic. The aim of this paper is to discuss the value of establishing mechanisms, immediately after an assessment and regularly between assessments, to facilitate a structured dialogue among leaders around insights derived from an assessment, to enable ongoing improvements in safety and security culture. The leader’s role includes both understanding the current state of culture, the “what is”, and creating regular, open and informed dialogue around their role in shaping the culture to achieve “what should be”.

  7. cultural differences in coordination decisions within interdependent security context

    OpenAIRE

    ju, linlin

    2009-01-01

    Abstract The purpose of this study is to investigate cultural differences in coordination decisions in a coordination game with considering IDS context. IDS context is introduced into a coordination game since it recently draws more and more people’s attention. The concepts of individualism/collectivism as the key aspects of culture variability are introduced into the cultural differences study. It is assumed that Chinese people are more collectivistic and more likely to coordinate each ot...

  8. Professionalizing the Estonian Reserve Component

    National Research Council Canada - National Science Library

    Everett, William

    1998-01-01

    .... In particular, citizen-soldier reserves can allow nations that do not face immediate external threats, such as Estonia, to meet their security requirements for less money than required by standing forces...

  9. Emission from Estonian oil shale power plants

    International Nuclear Information System (INIS)

    Aunela, L.; Haesaenen, E.; Kinnunen, V.; Larjava, K.; Mehtonen, A.; Salmikangas, T.; Leskelae, J.; Loosaar, J.

    1995-01-01

    Flue gas emissions from pulverized oil shale fired boilers of Estonian and Baltic power plants have been studied. The concentrations of NO x , CO, C x H y , HCI, Hf and polycyclic aromatic hydrocarbons in flue gases have been found to be relatively low and acceptable according to German emission limits, for instance. Desulphurization degree of flue gases by SO 2 absorption with ash has been found to vary defending on boiler type and operation conditions. In spite of significant sulphur capture (average values for different boilers in the range between 68 and 77 % of the initial sulphur content of the fuel), SO 2 concentrations in flue gases remain still very high (up to 2600 mg/m 3 , 10% O 2 ). Very high concentrations of particles, especially at Estonian Power Plant (up o 6250 mg/m 3 , 10 % 0 2 ) have been detected. Heavy metal emissions were too high by the reason of particle control insufficiency as well. Yearly emission estimates of this study support the former Estonian ones within the range of 10-15 %. (author)

  10. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  11. Using the competing values framework (CVF to investigate organisational culture in a major private security company

    Directory of Open Access Journals (Sweden)

    D Kokt

    2011-06-01

    Full Text Available The proliferation of crime, especially in the South African context, has placed considerable emphasis on the private security industry.  This has also increased fierce competition in the private security domain with both national and international private security companies infiltrating the South African market.  Like public policing private security has an important role to play in combating crime and other transgressions, with the exception that private security owes its existence to paying customers.  By using the Competing Values Framework (CVF as conceptual guide, the researchers are able to provide the managers of the company under investigation with insight on how their cultural orientation affects their functioning and ultimately their competitive advantage.

  12. Survey Analysis on Nuclear Security Culture Recognition of Nuclear Facility in 2014

    International Nuclear Information System (INIS)

    Hong, Yunjeong; Lee, Jeongho; Kim, Jaekwang

    2015-01-01

    All organizations involved in implementing physical protection should give due priority to the security culture, to its development and maintenance necessary to ensure its effective implementation in the entire organization. In this context, Korea Institute of Non-proliferation and Control(KINAC) confirms recognition about protection of people who work in nuclear field and developed questionnaire for utilizing fundamental data for nuclear security culture enhancement activity and conducted a survey. As a result, systematic education needs to employees. Choosing differentiated topic is required to consider employees because recognition level of age, position and division is different. And a variety of education technology as obligatory education such as filling the course time or the one-off thing has limitation. And taking complementary measures needs since there were many opinions that employees feel difficult to understand papers such as regulation and guidelines and so on related security. Finally, we hope to make fundament available to evaluate nuclear security culture recognition level based on the existing questionnaire would be changed to realistic and enhancement in recognition survey for future nuclear security culture

  13. Survey Analysis on Nuclear Security Culture Recognition of Nuclear Facility in 2014

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Yunjeong; Lee, Jeongho; Kim, Jaekwang [Korea Institute of Nonproliferation and Control International Nuclear Security Academy, Daejeon (Korea, Republic of)

    2015-05-15

    All organizations involved in implementing physical protection should give due priority to the security culture, to its development and maintenance necessary to ensure its effective implementation in the entire organization. In this context, Korea Institute of Non-proliferation and Control(KINAC) confirms recognition about protection of people who work in nuclear field and developed questionnaire for utilizing fundamental data for nuclear security culture enhancement activity and conducted a survey. As a result, systematic education needs to employees. Choosing differentiated topic is required to consider employees because recognition level of age, position and division is different. And a variety of education technology as obligatory education such as filling the course time or the one-off thing has limitation. And taking complementary measures needs since there were many opinions that employees feel difficult to understand papers such as regulation and guidelines and so on related security. Finally, we hope to make fundament available to evaluate nuclear security culture recognition level based on the existing questionnaire would be changed to realistic and enhancement in recognition survey for future nuclear security culture.

  14. Overview of the Estonian Biofuels Association activities

    International Nuclear Information System (INIS)

    Hueues, Meelis

    2000-01-01

    Due to global warming and environment pollution because of widespread use of fossil fuels there are already tendencies to stabilize and decrease the consumption of these energy resources and take into use more renewable energy resources. Estonian Biofuels Association (EBA) is a non-profit association, which was founded on 8. of May 1998 in Tallinn. The EBA is an independent and voluntary alliance of its members. Fields of activity of the EBA are by biofuels research, developing and evaluation to engage environmental, biofuels and energy saving. EBA members are: energy consultants, scientists, as well as fuel suppliers, DH-companies, technology suppliers, energy service companies etc. The members of EBA are involved in different projects in Estonia, where biomass are produced and used for heating, where wood, waste, peat, rape oil and biogas resources are examined and put into use, and also projects which deal with energy saving and environment friendly equipment production for using biofuels. During our short experience we have noticed that people in Estonia have become more aware of biomass and their use, so the development of environment friendly and sustainable energetics will continue in Estonia. Available biofuels in Estonia could compete with fossil fuels if burnt rationally with high technology equipment. EBA members are convinced that biomass have perspective and that they could play an important role in improving Estonian economic and environmental situation. Modem biomass combustion devices are taken into use more the faster general wealth increases and EBA can raise people's awareness of bio fuel subject through special, courses and media. We want Estonian energy policy to develop towards widespread use of renewable energy resources, which would save energy and environment improve nation's foreign trade balance and create jobs mainly in rural areas

  15. Socio-Cultural Impediments to Food Security in South-East Agro ...

    African Journals Online (AJOL)

    Against the background of the precarious food security situation in parts of Africa, this paper highlights aspects of Nigeria's culture that impinge on agricultural practice and food habits and consequently, undermine efforts to achieve the agrarian and rural development policy objectives of the federal and state governments of ...

  16. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis

    NARCIS (Netherlands)

    Malka, A.; Soto, C.J.; Inzlicht, M.; Lelkes, Y.

    2014-01-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with

  17. Maternal Sensitivity and Child Secure Base Use in Early Childhood: Studies in Different Cultural Contexts

    Science.gov (United States)

    Posada, German; Trumbell, Jill; Noblega, Magaly; Plata, Sandra; Peña, Paola; Carbonell, Olga A.; Lu, Ting

    2016-01-01

    This study tested whether maternal sensitivity and child security are related during early childhood and whether such an association is found in different cultural and social contexts. Mother-child dyads (N = 237) from four different countries (Colombia, Mexico, Peru, and the United States) were observed in naturalistic settings when children were…

  18. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  19. MINORITY LANGUAGES IN ESTONIAN SEGREGATIVE LANGUAGE ENVIRONMENTS

    Directory of Open Access Journals (Sweden)

    Elvira Küün

    2011-01-01

    Full Text Available The goal of this project in Estonia was to determine what languages are spoken by students from the 2nd to the 5th year of basic school at their homes in Tallinn, the capital of Estonia. At the same time, this problem was also studied in other segregated regions of Estonia: Kohtla-Järve and Maardu. According to the database of the population census from the year 2000 (Estonian Statistics Executive Office's census 2000, there are representatives of 142 ethnic groups living in Estonia, speaking a total of 109 native languages. At the same time, the database doesn’t state which languages are spoken at homes. The material presented in this article belongs to the research topic “Home Language of Basic School Students in Tallinn” from years 2007–2008, specifically financed and ordered by the Estonian Ministry of Education and Research (grant No. ETF 7065 in the framework of an international study called “Multilingual Project”. It was determined what language is dominating in everyday use, what are the factors for choosing the language for communication, what are the preferred languages and language skills. This study reflects the actual trends of the language situation in these cities.

  20. Utilisation of Estonian energy wood resources

    Energy Technology Data Exchange (ETDEWEB)

    Muiste, P.; Tullus, H.; Uri, V. [Estonian Agricultural University, Tartu (Estonia)

    1996-12-31

    In the end of the Soviet period in the 1980s, a long-term energy programme for Estonia was worked out. The energy system was planned to be based on nuclear power and the share of domestic alternative sources of energy was low. The situation has greatly changed after the re-establishment of the Estonian independence, and now wood and peat fuels play an important role in the energy system. Energy consumption in Estonia decreased during the period 1970-1993, but this process has less influenced the consumption of domestic renewable fuels - peat and wood. It means that the share of these fuels has grown. The investment on substitution of imported fossil fuels and on conversion of boiler plants from fossil fuels to domestic fuels has reached the level of USD 100 million. The perspectives of the wood energy depend mainly on two factors; the resources and the price of wood energy compared with other fuels. The situation in wood market influences both the possible quantities and the price. It is typical that the quickly growing cost of labour power in Estonia is greatly affecting the price of energy wood. Though the price level of fuel peat and wood chips is lower than the world market price today, the conditions for using biofuels could be more favourable, if higher environmental fees were introduced. In conjunction with increasing utilisation of biofuels it is important to evaluate possible emissions or removal of greenhouse gases from Estonian forests 3 refs.

  1. Utilisation of Estonian energy wood resources

    Energy Technology Data Exchange (ETDEWEB)

    Muiste, P; Tullus, H; Uri, V [Estonian Agricultural University, Tartu (Estonia)

    1997-12-31

    In the end of the Soviet period in the 1980s, a long-term energy programme for Estonia was worked out. The energy system was planned to be based on nuclear power and the share of domestic alternative sources of energy was low. The situation has greatly changed after the re-establishment of the Estonian independence, and now wood and peat fuels play an important role in the energy system. Energy consumption in Estonia decreased during the period 1970-1993, but this process has less influenced the consumption of domestic renewable fuels - peat and wood. It means that the share of these fuels has grown. The investment on substitution of imported fossil fuels and on conversion of boiler plants from fossil fuels to domestic fuels has reached the level of USD 100 million. The perspectives of the wood energy depend mainly on two factors; the resources and the price of wood energy compared with other fuels. The situation in wood market influences both the possible quantities and the price. It is typical that the quickly growing cost of labour power in Estonia is greatly affecting the price of energy wood. Though the price level of fuel peat and wood chips is lower than the world market price today, the conditions for using biofuels could be more favourable, if higher environmental fees were introduced. In conjunction with increasing utilisation of biofuels it is important to evaluate possible emissions or removal of greenhouse gases from Estonian forests 3 refs.

  2. Nuclear Regulatory Systems in Africa: Improving Safety and Security Culture Through Education and Training

    International Nuclear Information System (INIS)

    Kazadi Kabuya, F.

    2016-01-01

    The purpose of this paper is to address the important issue of supporting safety and security culture through an educational and training course program designed both for regulatory staff and licensees. Enhancing the safety and security of nuclear facilities may involve assessing the overall effectiveness of the organization's safety culture. Safety Culture implies steps such as identifying and targeting areas requiring attention, putting emphasis on organizational strengths and weaknesses, human attitudes and behaviours that may positively impact an organization's safety culture, resulting in improving workplace safety and developing and maintaining a high level of awareness within these facilities. Following the terrorist attacks of September 11, 2001, international efforts were made towards achieving such goals. This was realized through meetings, summits and training courses events, with main aim to enhance security at facilities whose activities, if attacked, could impact public health and safety. During regulatory oversight inspections undertaken on some licensee's premises, violations of security requirements were identified. They mostly involved inadequate management oversight of security, lack of a questioning attitude, complacency and mostly inadequate training in both security and safety issues. Using training and education approach as a support to raise awareness on safety and security issues in the framework of improving safety and security culture, a tentative training program in nuclear and radiological safety was started in 2002 with the main aim of vulgarizing the regulatory framework. Real first needs for a training course program were identified among radiographers and radiologists with established working experience but with limited knowledge in radiation safety. In the field of industrial uses of radiation the triggering events for introducing and implementing a training program were: the loss of a radioactive source in a mining

  3. Maternal sensitivity and infant attachment security in Korea: cross-cultural validation of the Strange Situation.

    Science.gov (United States)

    Jin, Mi Kyoung; Jacobvitz, Deborah; Hazen, Nancy; Jung, Sung Hoon

    2012-01-01

    The present study sought to analyze infant and maternal behavior both during the Strange Situation Procedure (SSP) and a free play session in a Korean sample (N = 87) to help understand whether mother-infant attachment relationships are universal or culture-specific. Distributions of attachment classifications in the Korean sample were compared with a cross-national sample. Behavior of mothers and infants following the two separation episodes in the SSP, including mothers' proximity to their infants and infants' approach to the caregiver, was also observed, as was the association between maternal sensitivity observed during free play session and infant security. The percentage of Korean infants classified as secure versus insecure mirrored the global distribution, however, only one Korean baby was classified as avoidant. Following the separation episodes in the Strange Situation, Korean mothers were more likely than mothers in Ainsworth's Baltimore sample to approach their babies immediately and sit beside them throughout the reunion episodes, even when their babies were no longer distressed. Also, Korean babies less often approached their mothers during reunions than did infants in the Baltimore sample. Finally, the link between maternal sensitivity and infant security was significant. The findings support the idea that the basic secure base function of attachment is universal and the SSP is a valid measure of secure attachment, but cultural differences in caregiving may result in variations in how this function is manifested.

  4. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    Science.gov (United States)

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  5. Az észt névtervezés az észt nyelvpolitikai modell tükrében [The name management in the mirror of the Estonian LPP-model

    Directory of Open Access Journals (Sweden)

    Pomozi, Péter

    2016-12-01

    Full Text Available The Estonian model of language planning and policy, which has been serving the development and protection of the Estonian language in its current form since 2004, is one of the most successful of such strategies in Europe. It owes it success to the broad social and scientific consensus reached in questions of language policy, regardless of changes in government. The Development Plan of the Estonian Language divides Estonian language planning and policy into three parts: status planning, corpus planning and prestige planning. Name management is a part of corpus planning, although certain aspects are also connected to legal and prestige planning. Name management strategies are present in all components of the Estonian model of language planning and policy, as linguistically appropriate name use is not only a socio-cultural, but economic question, as informative and easy to understand names contribute to measurable economic advantages. The paper mainly demonstrates the dilemmas and answers of Estonian name management through examples from personal name giving practices, but questions concerning the problems of name use in a multicultural environment and the difficulties of place name and firm name management are also discussed.

  6. Estonian Air valmistub odavate piletitega EasyJeti tulekuks / Erkki Erilaid

    Index Scriptorium Estoniae

    Erilaid, Erkki

    2004-01-01

    Estonian Air pidi langetama piletihindu Berliini ja Londoni liinil kolmandiku võrra, kuna oktoobri lõpust hakkab Tallinna lennujaamast reise tegema uus odavlennufirma Easy-Jet. Lisa: Estonian Airi hinnad internetis

  7. Estonian Air lõpetab Pariisi ja Vilniuse lennud / Hindrek Riikoja

    Index Scriptorium Estoniae

    Riikoja, Hindrek

    2005-01-01

    Talvisele lennuplaanile üleminev Estonian Air lõpetab otselennud Tallinnast Vilniusesse ja Pariisi. Estonian Airi presidendi Borge Thornbechi sõnul kavatseb firma suurendada talvehooajal turismilendude mahtu

  8. Isamaalaulud ja okupatsioonirežiim – nostalgia, utoopia ja reaalsus. Estonian Patriotic Songs and the Occupational Regime – Nostalgia, Utopia and Reality

    Directory of Open Access Journals (Sweden)

    Kanni Labi

    2012-04-01

    Full Text Available Estonian knowledge of history emanates from the fact that constituting an independent nation has for the most part been nothing but a utopia, and was a reality for a relatively short time. When it comes to selfidentification though, the expression ’a singing people’ is often used by the Estonians to describe themselves. Nostalgia for freedom is reflected in the Estonian culture of almost all periods and is carried on by the singing tradition, where patriotic songs emerge independent of different musical tastes within a particular generation and form an important part of a common Estonian repertoire. Patriotic songs occupy a central place in several fields of Estonian culture: besides music culture also in popular culture,and literary history – the works of poetry which have gained the most popularity are those which when put to music have been the most widely spread among the people. The main part of the most popular Estonian patriotic songs are choral songs from the national awakening at the end of the 19th century. Despite the national programmes aiming to wipe out ‘bourgeois nationalism’, they were sung at the song festivals in the Soviet era and were published in song books, expressing the people’s nostalgia for freedom lost. After the end of the Second World War, there was an attempt at launching a kind of patriotic new creation, where patriotism was merged with Soviet pathos; the aim was to show that the people’s utopia was in fact communism, but not a single one of those songs made it into the people’s common repertoire. Only the patriotic songs composed in the 1980s during the so-called new national awakening reached a popularity comparable to that of the old songs. The discourse on ’Estonianness’ and the shaping of a matching repertoire under imperial Russian rule took place under very different circumstances than its preservation and development in the second half of the 20th century under Soviet occupation, but

  9. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    transform an organization through 8 U.S. Government Accountability Office, “Homeland Security: Efforts...www.whitehouse.gov/omb/ egov /documents/FEA_Practice_Guidance.pdf (accessed September 23, 2007), 4-1. 10 U.S. Government Accountability Office, GAO-04-777, 12...between the federal government and the state and local governments , and the transformation of disparate cultures into a new executive department – the

  10. Cresco sai lahti võlast SASile ja osalusest Estonian Airis / Rivo Sarapik, Alyona Stadnik

    Index Scriptorium Estoniae

    Sarapik, Rivo, 1981-

    2010-01-01

    Majandus- ja kommunikatsiooniminister Juhan Parts ning SAS-i asepresident Benny Zakrisson kirjutasid alla Estonian Airi ostu-müügitehingule. Investeerimispank Cresco, millele kuulus 17% Estonian Airist, jääb välja Estonian Airi omanikeringist ning SAS-i nõue Crescole tühistatakse

  11. SAS tahab Estonian Airi liita lätlaste firmaga airBaltic / Andres Eilart

    Index Scriptorium Estoniae

    Eilart, Andres

    2007-01-01

    SAS plaanib Estonian Airi ja Läti firma airBalticu liitmisega luua uue lennufirma. Autori hinnangul viitavad Estonian Airi laienemisplaanidele kriipsu peale tõmbamine ja SAS-i investeeringud airBalticusse sellele, et ühendamise käigus "neelab" Läti firma Estonian Airi

  12. Joakim Helenius: Estonian Air võtku eeskuju airBalticust / Siim Sultson

    Index Scriptorium Estoniae

    Sultson, Siim

    2010-01-01

    Estonian Airi ühe võimaliku nõukogu esimehe Jaokim Heleniuse hinnangul on väikeste lennufirmade, nagu Estonian Air ja airBaltic jaoks päris palju tegutsemisruumi. Estonian Airil tuleb leida oma nišš ja kindel, kuid omanäoline strateegia

  13. Strengthening Safety Culture as an Overriding Priority, in Achieving Global Nuclear Security Approach

    International Nuclear Information System (INIS)

    Kolundzija, V.

    2006-01-01

    In the IAEA glossary safety culture is defined as the assembly of characteristics and attitudes in organizations and individuals, which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance. It has been observed that a safety culture, as a part of both security and safety, possesses a few obstacles that should be noticed: safety culture cannot be directly regulated; variation in national cultures means that what constitutes as a good approach to enhancing safety culture in one country may not be the best approach in another. Three stages have been identified in developing and strengthening safety culture: 1 A technical issue (rules and regulations)/ first stage 2 Good safety performance (primarily in terms of safety targets or goals)/ second stage 3 A continuing process of improvement to which everyone can contribute/ third stage There are several key issues in safety culture, such as: a commitment, use of procedures, a conservative decision making (STAR) a reporting culture. Organizations and individuals should have attention on these. Overall common goals are to achieve and maintain a high level of safety and security of radioactive sources as well as facilities. Measures that are concerned on safeguards restrict access to the radioactive sources, conditioning and/or recycling of sources, and systems for detection the passage of the radioactive sources at strategic points, have gained main support. The main partners in implementation these measures are: IAEA, USA, Russian Federation, G8- Global Partnership, and European Union The member states of the IAEA have at their disposal internationally agreed standards. Current differences in applying standards in the IAEA member states are mainly related to state preparedness to cope with demands. Developing and less developed countries with small and medium nuclear programmes have difficulties to accept rules and regulations, to establish

  14. Cultures, Conditions, and Cognitive Closure: Breaking Intelligence Studies’ Dependence on Security Studies

    Directory of Open Access Journals (Sweden)

    Matthew Crosston

    2015-09-01

    Full Text Available This paper is about how the conceptualization of ‘culture’ in intelligence studies has taken on too powerful a role, one that has become too restrictive in its impact on thinking about other intelligence communities, especially non-Western ones. This restriction brings about unintentional cognitive closure that damages intelligence analysis. The argument leans heavily in many ways on the fine work of Desch and Johnston in the discipline of Security Studies, who cogently brought to light over fifteen years ago how ultra-popular cultural theories were best utilized as supplements to traditional realist approaches, but were not in fact capable of supplanting or replacing realist explanations entirely. The discipline of Intelligence Studies today needs a similar ‘intellectual intervention’ as it has almost unknowingly advanced in the post-Cold War era on the coattails of Security Studies but has largely failed to apply the same corrective measures. This effort may be best accomplished by going back to Snyder in the 1970s who warned that culture should be used as the explanation of last resort for Security Studies.

  15. Estonian Airi president : uus äristrateegia toob ettevõttele edu / Borge Thornbech ; interv. Andres Reimer

    Index Scriptorium Estoniae

    Thornbech, Borge

    2007-01-01

    Estonian Air asutas regionaalsete lendude korraldamiseks ettevõtte Estonian Air Regional, idee on arendada tegevust lühidistantsidel ja luua ühenduslüli lennukompanii Euroopa-liinide vahel. Kommenteerivad Olev Schults, Oleg Harlamov, Rein Mark. Vt. samas: Kõik aktsionärid vannuvad Estonian Airile truudust; Estonian Air kaalub Tartu lennuliini avamist. Kaart: Reisijate jagunemine sihtkohtade vahel. Graafikud: Estonian Air kukkus kahjumisse

  16. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  17. Liberalism - Key to Entrepreneurial and Innovation Success: Estonian Case Study

    Directory of Open Access Journals (Sweden)

    Augustin Ignatov

    2017-12-01

    Full Text Available Since its independence in 1991 Estonia has successfully overpassed the challenges of the transition period being in the present of one the most technologically developed nations of Europe. The present research is intended to evaluate the relationship between Estonian pro-market regulation, entrepreneurship and innovation. In order to reach relevant conclusions in this regard there have been used both qualitative and quantitative methods of analysis. In such a way, it could be comprehensively reviewed the process of Estonian economic development from a relatively underdeveloped USSR republic to an advanced innovation driven economy. The results show that pro-market governmental regulation has favourably influenced Estonian entrepreneurship, while it fostered country’s innovation capacities. It has been concluded that the economic “miracle” of Estonia has been at a great extent determined by proper government regulation oriented towards economic liberalisation.

  18. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  19. Noor-Eesti enesekoloniseerimisprojekt. Teine osa Olulised kirjandusmõtteviisid . The Self-Colonization Project of Young Estonia. Part II. Modes of Literary Thinking and Relations with Colonialism in Estonian Literature of the beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Tiit Hennoste

    2012-04-01

    Full Text Available The topic of this article is the literary discourse of Young Estonia; its relations with other important Estonian literary discourses from the beginning of the 20th century, and its relations with colonial cultural discourse. First, I give an overview of the basic positions of the Young Estonians’ literary discourse, the main shapers of which were Friedebert Tuglas, Gustav Suits, later on Johannes Semper as well. Next, I present the basic principles of three Estonian literary discourses from the beginning of the 20th century, which were also important to the Young Estonians: nationalist-naturalistic (close-to-life; socialist/ class-based, and 20th century modernist. The Young Estonians began as nationalists and/or socialists. During the formation of Young Estonia’s discourse at the end of the first and beginning of the second decade of the 20th century, 20th century modernism began, which the Young Estonians regarded first and foremost with irony. The Young Estonians’ literary discourse is a mixture of aestheticism, decadence, symbolism, romanticism, and classicism. The point of departure for the Young Estonian approach to literature was eurocentrism. They took a superior and negative view of existing Estonian literature, which they regarded as having fallen drastically behind Europe. Since it was unable to build on its own foundation, it had to borrow from Europe. The discourse’s understandings of cultural values – theory, reading, knowledge, ready-made culture, derive from the centrality of the dynamic of borrowing. New culture could be created freely, without the support of previous local tradition; it was to be an elite culture, while the writer remained an individualist. Literature was to follow the principle of art for art’s sake; aesthetics and the form of the work of art were basic criteria. The formal ideals of the work of art were classicist: unity, integrity (wholeness, harmony, order, logic, etc. Thirdly, I outline the

  20. Ethnic Self-Esteem and Intergroup Attitudes Among the Estonian Majority and the non-Estonian Minority

    Directory of Open Access Journals (Sweden)

    Maaris Raudsepp

    2009-11-01

    Full Text Available The study was focussed on the relationships between ethnic self-esteem and various indicators of intergroup attitudes in a representative sample of adult population of Estonia (N=1142. Attitudinal variables that discriminated most between persons with high and low ethnic self-esteem were identified. Among Estonians ethnic self-esteem was related to positive ingroup bias, readiness for outgroup contact, perceived threat from the outgroup, attitudes to non-Estonian minority, and attitudes toward minority integration. Among non-Estonians ethnic self-esteem was related to readiness for outgroup contact, ethnic sterotypes, and various attitudes towards minority integration. An attempt was made to reconstruct the system of intergroup attidues of prototypical persons with high and low ethnic selfesteem and to describe psychological implications of high and low ethnic self-esteem for members of majority and minority groups. Various theoretical models (social identity theory, integrated threat theory, social dominane theory were used for interpretation of the results.

  1. Exploring undergraduate midwifery students' readiness to deliver culturally secure care for pregnant and birthing Aboriginal women.

    Science.gov (United States)

    Thackrah, Rosalie D; Thompson, Sandra C; Durey, Angela

    2015-04-16

    Culturally secure health care settings enhance accessibility by Aboriginal Australians and improve their satisfaction with service delivery. A culturally secure health service recognises and responds to the legitimate cultural rights of the recipients of care. Focus is upon the health care system as well as the practice and behaviours of the individuals within it. In an attempt to produce culturally secure practitioners, the inclusion of Aboriginal content in health professional programs at Australian universities is now widespread. Studies of medical students have identified the positive impact of this content on knowledge and attitudes towards Aboriginal people but relatively little is known about the responses of students in other health professional education programs. This study explored undergraduate midwifery students' knowledge and attitudes towards Aboriginal people, and the impact of Aboriginal content in their program. The study surveyed 44 students who were in their first, second and third years of a direct entry, undergraduate midwifery program at a Western Australian (WA) university. The first year students were surveyed before and after completion of a compulsory Aboriginal health unit. Second and third year students who had already completed the unit were surveyed at the end of their academic year. Pre- and post-unit responses revealed a positive shift in first year students' knowledge and attitudes towards Aboriginal people and evidence that teaching in the unit was largely responsible for this shift. A comparison of post-unit responses with those from students in subsequent years of their program revealed a significant decline in knowledge about Aboriginal issues, attitudes towards Aboriginal people and the influence of the unit on their views. Despite this, all students indicated a strong interest in more clinical exposure to Aboriginal settings. The inclusion of a unit on Aboriginal health in an undergraduate midwifery program has been shown to

  2. Estonian Golf & Country Club / Liina Jänes

    Index Scriptorium Estoniae

    Jänes, Liina, 1977-

    2005-01-01

    Estonian Golf & Country Club'i etnomodernistlik golfikeskus ja klubihoone Jõelähtmel. Projekteerija: Arhitektuuristuudio Siim & Kreis. Autor Andres Siim. Konstruktor: Resand. Sisekujundaja Juta Lember (SAB Lember & Padar). Projekt 2004, valmis 2005. Ill.: I ja II korruse plaan, 3 värv. välis ja 3 sisevaadet

  3. Estonian Golf & Country Clubi klubihoone / Andres Siim, Alar Just

    Index Scriptorium Estoniae

    Siim, Andres

    2005-01-01

    Harjumaal Jõelähtme vallas rajab Estonian Golf & Country Club uut Jägala-Jõesuu spordi- ja puhkekeskust, mille südameks saab puidust golgiklubi hoone, mida tutvustavad klubihoone arhitekt ja üks inseneridest. Ill.: vaade ehitusele, projekti kaks vaadet, lõige

  4. Top 10 Estonian albums of 2004 / Igor Garshnek

    Index Scriptorium Estoniae

    Garšnek, Igor, 1958-

    2004-01-01

    Heliplaatidest: Arvo Pärt "Pro et contra", Various composers "Baltic Voices 2", Raimo Kangro "Displays", Toivo Tulev "Be Lost in the Call", Indrek Vau and Mati Mikalai "Estonian Trumpet Music", Erdmann/Sooäär "Dessert Time, Peer Gynt & Other Stories", Alo Mattiisen "50 parimat laulu", Riho Sibul "Must", Rein Rannap "Tantsib klaveril", Eesti Keeled "Kella tiksumist..."

  5. Value Education in Estonian Preschool Child Care Institutions

    Science.gov (United States)

    Ülavere, Pärje; Tammik, Anu

    2017-01-01

    For systematic implementation of value education in educational institutions, the national programme "Values Development in Estonian Society 2009-2013" (Ministry of Education and Research 2009) was prepared in Estonia. However, it was launched only in 2010, and the authors intended to ascertain the values of the heads of preschool child…

  6. FOREIGN EXPERIENCE OF THE FORMATION OF INFORMATION SECURITY CULTURE IN SOCIETY

    Directory of Open Access Journals (Sweden)

    A. A. Malyuk

    2016-12-01

    Full Text Available In the context of ever increasing information dependence of all spheres of activity of the company reliability and dependability of information and communication technologies (ICT, quality of information, which is used by members of the information society, saving secrets is of paramount importance. Users must trust all information services they use. Otherwise, the consequences for society and each individual can be simply disastrous. Thus, one of the main problems of the development of the information society is to ensure the information security of the individual, society and state. In order to successfully resist the flow of threats and challenges, each member of the information society must have a certain minimum knowledge, culture and appropriate information to be prepared for an active struggle for the purity of the various types of ICT cyber-hawks, cybercriminals, cyber-terrorists and just cyber-bullies. At the same time, as shown by statistics and sociological research, while rapidly increasing the level of the use of global information and communication networks the level of information literacy of users and their information culture is extremely low. Only about 10 percent of people are more or less aware of the dangers they face while working on the Internet, or they (unwillingly is subjected to its correspondents. Thus, today the key issue of the Information Society becomes the formation of information culture of users and, above all, raising their awareness in this area. Analysis of approaches and expertise to solve this problem (especially overseas is the subject of this article. The conceptual and substantive plans for the material of the article is based on a UN General Assembly resolution that approved in December 2002 the principles of formation of global culture of cybersecurity

  7. Vene kirjandus venestusaja eesti koolides. Russian Literature in the Estonian Schools of the Russification Era

    Directory of Open Access Journals (Sweden)

    Ülle Pärli

    2012-04-01

    more modern authors altogether (to the point of banning them – this applied especially to the works of Fjodor Dostojevski. However, a good command of Russian made it possible to read those works not approved by the school, and to keep abreast of more recent Russian literature. Young Estonians took conspicuous interest in turn-of-the-century Russian literary life. Over time the split between ”anthologized” and real Russian literature continued to deepen, as did the conflict between the works and their official interpretations in schoolbooks. This tendency coincided with processes of renewal in Estonian literature. In the interim, knowledge of classical Russian literature acquired in school remained at the level of passive coexistence in the culture, a kind of backdrop to newer undertakings. Thus it is interesting to note that articles on Aleksandr Pushkin published in the 1920s Estonian press were addressed to the reader assumed to be knowledgeable both about his works and his biography. Reminiscences of school in the memoirs of several Estonian authors serve as evidence that learning about Russian literature, particularly poetry, was perhaps their only bright memory of school in the russification era.

  8. Eesti autobiograafilise kirjutuse kujunemisest 18. sajandist Teise maailmasõjani. The Development of Estonian Autobiographical Writing from the 18th Century to the Second World War

    Directory of Open Access Journals (Sweden)

    Rutt Hinrikus

    2012-04-01

    Full Text Available In this article I examine the development of Estonian autobiographical writing from its first manifestations to published memoirs, and the development of life writing and its diversification. The beginnings of life writing can be traced back to Estonian folk song and Estonian incidental poetry. The Moravian Brethren movement in Estonia in the 18th century promoted the spread of canonical autobiography. The Moravian Brethren offered alternative opportunities for self-realisation for Estonians who were serfs, and were therefore popular with the people. The practice of the Moravian Brethren made use of retelling and writing about the life of the congregation members, which sometimes became suitable biographies in print, especially stories of awakening. Several manuscript biographies have survived from the Brethren times, such as the biographies of Mäletu Jaan and Mihkel Sarapuu. In addition to the history of the Moravian Brethren movement, these biographies give information about the educational situation and living conditions of the people of the time. The Estonian life writing tradition emerged within the reigning Baltic German cultural space thanks to the Estophiles among the Baltic Germans (J. H. Rosenplänter and the first Estonian men of letters; from the early 19th century we have the diary by Rosenplänter, an estophile pastor from Pärnu, and the diary by the Estonian poet, the then-student Kristjan Jaak Peterson, both in the Estonian language. Johann Voldemar Jannsen, the founder of Estonian-language journalism, kept a diary in the German language for a longer period of time; it was usual that the first Estonian intellectuals (Lilli Suburg, and others in the late 19th century wrote in German. Admittedly, the first Estonian-language life history was written by a forward-looking 19th century peasant named Märt Mitt (1833-1912, who was conscious of himself as a historical subject and gave his memoirs, begun in the 1880s, a memorable title

  9. Jüri Okas’ ‘specific objects’: diverging discourses in Estonian Art in the 1970s.

    OpenAIRE

    Kurg, Andres.

    2003-01-01

    Previously in the University eprints HAIRST pilot service at http://eprints.st-andrews.ac.uk/archive/00000367/ Article 3 of 6 in issue devoted to the visual culture of the Scandinavian and Baltic region. This article will look at the early works of Estonian architect and artist Jüri Okas and will try to work between diverging languages and interpretations, reading works by Okas against the background of Anglo-american conceptualism and minimalism of the same period. The first part of th...

  10. [Pärtel Lippus. The acoustic features and perception of the Estonian quantity system] / Stefan Werner

    Index Scriptorium Estoniae

    Werner, Stefan

    2012-01-01

    Arvustus: Pärtel Lippus. The acoustic features and perception of the Estonian quantity system. Tartu : Tartu University Press, 2011. (Dissertationes philologiae estonicae Universitatis Tartuensis ; 29)

  11. Estonian Air püüdis viimase hetkeni Top Toursi päästa / Mirko Ojakivi

    Index Scriptorium Estoniae

    Ojakivi, Mirko

    2010-01-01

    Estonian Air kaalus Top Toursile appiminekut, sest reisifirma oli Estonian Airil üks olulisemaid koostööpartnereid. Abi oleks puudutanud ennekõike uutele lendudele allahindluse tegemist, räägiti ka võimalikust krediidist

  12. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  13. The Estonian study of Chernobyl cleanup workers. I. Introduction

    International Nuclear Information System (INIS)

    Rahu, Mati

    1999-01-01

    The most comprehensive epidemiological project ever performed in Estonia - The Estonian Study of Chernobyl Cleanup Workers - was the joint effort of researchers from Estonia, Finland and USA. Until September 1999, the results of this study were published in English only. To familiarize the readership of 'Eesti Arst' with the major study findings, the abridged versions of four original papers from 'Radiation Research' are presented in the current issue of the journal. For the Estonian epidemiologists, the work under this project that consists of eight sub projects was a real challenge. In the course of the study, skills were developed in writing a study protocol, preparing a questionnaire, progress reporting, documenting the structure of databases, record linkage, and problem solving. It was an exciting experience to work with top scientists like William Bigbee, John Boice, Timo Hakulinen, Ronald Jensen and Gayle Littlefield. (author)

  14. Critical Success Factors and information needs in Estonian industry

    Directory of Open Access Journals (Sweden)

    Aiki Tibar

    2002-01-01

    Full Text Available The article reports the results of the study on the critical success factors and related information needs in Estonian industry conducted in 1999. Data were collected by interviews with 27 managers and engineers from 16 manufacturing companies in various industries. Most of the critical success factors taken up were related to marketing, information management, quality management, product development and technological innovations. The information needs of managers and engineers were related to competitors, customers, markets, technology, regulations, etc. Some identified CSFs expressed also priorities for development by Estonian economic authorities: to support the implementation of new technologies and introduction of quality management methods. The finding that information management was perceived as a very critical area supports the result of the recent Finnish study on CSFs.

  15. Trace metal emissions from the Estonian oil shale fired power

    DEFF Research Database (Denmark)

    Aunela-Tapola, Leena A.; Frandsen, Flemming; Häsänen, Erkki K.

    1998-01-01

    Emission levels of selected trace metals from the Estonian oil shale fired power plant were studied. The plant is the largest single power plant in Estonia with an electricity production capacity of 1170 MWe (1995). Trace metals were sampled from the flue gases by a manual method incorporating...... in the flue gases of the studied oil shale plant contribute, however, to clearly higher total trace metal emission levels compared to modern coal fired power plants. Although the old electrostatic precipitators in the plant have been partly replaced by state-of-the-art electrostatic precipitators...... a two-fraction particle sampling and subsequent absorption of the gaseous fraction. The analyses were principally performed with ICP-MS techniques. The trace metal contents of Estonian oil shale were found to be in the same order of magnitude as of coal on average. The high total particle concentrations...

  16. Exhibition of photography from the Estonian diaspora / Ellu Maar

    Index Scriptorium Estoniae

    Maar, Ellu, 1982-

    2010-01-01

    Näitus "Photography from the Estonian Diaspora / Väliseesti foto" Kumu Kunstimuuseumis 8.10.-19.11.2010, kuraatorid Eha Komissarov ja Ellu Maar. Näitus tutvustas 1944. a. Eestist lahkunud või juba võõrsil sündinud fotograafide (Eric Soovere, Karl Hintzer, Priit Vesilind, Rein Välme jt.) loomingut ja valikut väliseesti fotoarhiividest

  17. Estonian Leader's Freedom Call Creates Storm / Anna Smolchenko

    Index Scriptorium Estoniae

    Smolchenko, Anna

    2008-01-01

    President Toomas Hendrik Ilvese esinemisest soome-ugri rahvaste maailmakongressil Hantõ-Mansiiskis, kohtumisest Venemaa presidendi Dmitri Medvedeviga, Eesti delegatsiooni saalist väljamarssimisest Venemaa riigiduuma väliskomisjoni esimehe Konstantin Kossatshovi sõnavõtu ajal. Ilmunud ka: St. Petersburg Times 1. juuli 2008, pealk.: Estonian Leader's Freedom Call Creates Controversy (lüh.). Vabariigi President töövisiidil Venemaal 27.-30.06.2008

  18. Tõlkepärl eesti ilukirjanduse algusaegadest – esimene eestikeelne robinsonaad / A Translation Gem from the Beginnings of Estonian Literature - the First Robinsonade

    Directory of Open Access Journals (Sweden)

    Ave Mattheus

    2015-06-01

    Descriptive Translation Studies, this article focused on the one hand on the Lorenzsonn's Campe-translation, and on the other hand, on the context of the target culture, arriving at conclusions concerning the factors influencing the translation process. The article uses Gideon Toury’s treatment of translation norms to discuss ideosyncrasies of the participants of the translation process (translator, mentor, censor, as well as the relevance of other norms. First preliminary norms regarding translation policy are analysed. Secondly, initial norms determine whether the translation is oriented to the source text and culture (the goal is adequacy or to the target text and culture (the goal is acceptance. Thirdly, operational norms direct particular translation decisions. Operational translation norms can be divided further into matricial norms that concern the fullness of the translated text and textual-linguistic norms that concern the questions of grammar, syntax, style etc. The article focuses on the presumed decisions of Heinrich Gottlieb Lorenzsonn and his teacher and mentor, well-known Baltic German Estophile Johann Heinrich Rosenplänter, in the translation process. In addition, the article discusses the educational circumstances in primary schools for peasants in Estonia in the first half of the 19th century and the reading skills of potential Estonian-speaking readers at that time. Clearly, at the beginning of the 19th century, the Estonian-speaking audience was too small and not yet ready for such voluminous, demanding aesthetic and scientific reading materials. The comparative analysis of the translation manuscript and the printed text focuses on the lexical, semantic and grammatical levels, concluding that the manuscript aspires to adequacy with respect to Campe’s Robinsonade, but the printed version appeals to the Estonian-speaking reader and the Estonian cultural context. This can be explained by the fact that the aim of the manuscript was language study, while

  19. Efficiency of Estonian grain farms in 2000 2004

    Directory of Open Access Journals (Sweden)

    N. VASILIEV

    2008-12-01

    Full Text Available The aim of this study is to analyse the efficiency of Estonian grain farms after Estonia’s transition to a market economy and during the accession period to the European Union (EU. The non-parametric method Data Envelopment Analysis (DEA was used to estimate the total technical, pure technical and scale efficiency of Estonian grain farms in 2000–2004. Mean total technical efficiency varied from 0.70 to 0.78. Of the grain farms 62% are operating under increasing returns to scale. Solely based on the DEA model it is not possible to determine optimum farm scale and the range of Estonian farm sizes operating efficiently is extensive. The most pure technically efficient farms were the smallest and the largest but the productivity of small farms is low compared to larger farms because of their small scale. Therefore, they are the least competitive. Since pre-accession period to the EU, large input slacks of capital have replaced the former excessive use of labour and land. This raises the question about the effects on efficiency of the EU’s investment support schemes in new member states.;

  20. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  1. Olev Schults : SAS vajab Estonian Airi rahvusliku lennufirmana / Olev Schults ; interv. Andres Reimer

    Index Scriptorium Estoniae

    Schults, Olev

    2008-01-01

    Estonian Airi nõukogu esimees vastab küsimustele, kas SAS arendas Läti airBalticut Estonian SAS-i arvel, mis mõte on rahvuslikul lennukompaniil, kui riik ei tohi seda finantseerida, kuidas mõjutab investorite meeleolu SAS-i Eestis tabanud poliitikute kriitika tulv

  2. The Representation of the Cold War in Three Estonian History Textbooks

    Science.gov (United States)

    Korbits, Keit

    2015-01-01

    The article looks at the discursive strategies different Estonian history textbooks employ to represent the Cold War period, and the "commonsense" ideologies instilled through these representations. The textbooks analysed include two history books dating back to the Estonian Soviet Socialist Republic and, for contrast, one written during…

  3. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  4. Uniting the Divided Continent. The Estonian National Committee of the European Movement

    Directory of Open Access Journals (Sweden)

    Pauli Heikkilä

    2010-12-01

    Full Text Available The article examines the exiled Estonian politicians in the European Movement in the early Cold War period. The ultimate goal of exiled Estonians was to restore their state’s independence. In order to promote this, Estonian leaders sought connections with Western leaders. The European Movement was the only organisation involving actors from both the East and the West, and this corresponded to the Estonian discourse on Europe as a whole. Therefore, the European Movement was appreciated, although its limited opportunities for decisive actions were also recognised. East and West European interest in the European Movement declined as West European integration rapidly intensified through the European Coal and Steel Community (ECSC and particularly after the January 1952 Eastern European Conference in London. By 1957, disappointment in the inability of European unification to help regain Estonian independence became evident.

  5. Where Do Dead Books Go? The Problem of the Soviet Canon Today, on the Example of Johannes Becher's Work in Estonian

    Directory of Open Access Journals (Sweden)

    Katre Talviste

    2013-06-01

    Full Text Available The article describes the conception and editing process of an anthology of Johannes Becher’s poems (Unistades täiusest, 1962 in Estonian, and discusses its status in the Soviet and contemporary literary canon. The work on the Becher anthology was led by an already outstanding literary scholar Nigol Andresen and a young poet and translator Ain Kaalep, who later became one of the most prolific and wellknown poetry translators in Estonia. An important part was also played by another poet-translator, August Sang, who already had achieved such a standing in the Estonian literary field. Several other translators contributed to the anthology, making it a common project for intellectuals otherwise very differently positioned vis-à-vis the Soviet political authorities and cultural agendas. Becher’s work was strongly promoted by these instances, but his poetry was also read with genuine enthusiasm by the main contributors to the anthology (whose own poetry has certain parallels to some aspects of Becher’s, as well as the general public, at that time. After the fall of the Soviet regime it has been forgotten, mostly for the same contextual reasons that once granted its success. The case of his poetry in Estonian explores the question of this new invisibility of now politically irrelevant, but still voluminous and aesthetically intriguing literary works in the post-Soviet canon.

  6. Political-Security, Economy, and Culture within the Dynamics of Geopolitics and Migration: On Philippine Territory and the Filipino People

    OpenAIRE

    John X. LAMBINO

    2015-01-01

    The paper considers the interaction of the dual elements of the nation-state: territory and people. Particularly, it discusses the interaction of geopolitics and migration, i.e. the non-mobile territory and the mobile people, from the perspectives of political-security, economy, and culture, and how the interactions influence government policy focusing on the case of the Philippines.The paper ferrets-out the major factors in the geopolitical transformation of the Philippine Is-lands into the ...

  7. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    Science.gov (United States)

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  8. Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract)

    NARCIS (Netherlands)

    Pieters, Wolter; Consoli, L.

    2006-01-01

    This paper is part of a project to investigate the philosophical aspects of the scientific discipline of information security. This eld of research investigates the means to protect information systems against attacks, typically by modelling the system according to a certain security model, and

  9. Estonian Language of Technology as a Factor Supporting the Evolution of Engineering Thinking

    Directory of Open Access Journals (Sweden)

    Mägi, Vahur

    2013-03-01

    Full Text Available Casual mention of teaching technology subjects in Estonian schools dates back several centuries. Navigation and construction were amongthe earliest professional skills that were taught. As both of them required mathematical thinking skills, teaching the subjects was usually accompanied by explaining the principles of mathematics. The first technology book in Estonian was published about two centuries ago and it dealed with geodesy. The earliest Estonian glossaries of technological terminology were published in the fields of physics and chemistry. The rise of Estonian as a language of higher education and science in the country came about in the 1920s and 1930s. Faculty members of the Tallinn School of Technology then published the first textbooks composed in the Estonian language for students of technology. The Estonian Society for Technology and the Estonian Association of Engineers became seriously involved in linguistic activities. Together with the Vocational Teachers’ Assembly of Tartu they published an illustrated technology glossary for machinery and tools terms. It was followed by a glossary of construction and building terms, compiled under the lead of the University of Technology. In addition, journals of technology introducedinnovations in the lexicon of technology to the general public. The postwar period in the development of the lexicon of technical terms was of little significance at first. A surge in language creativity could be detected in the 1960s, when terminology became a target of constantly growing attention to the development of technology lexicon. Series of technology glossaries were published. This tendency has continued to this day.

  10. E-Banking: Risk Management Practices of the Estonian Banks

    OpenAIRE

    Dmitri Sokolov

    2007-01-01

    During the last years the development of e-banking in Estonia has been very significant. According to the report of the World Economic Forum, the Estonian IT-development has been substantial. The success of e-banking in Estonia can be compared to the corresponding success of the Nordic countries. According to the Deutsche Bank Research, around 70-80% of the Internet users in Estonia use Internet banking and in this respect, Estonia could be compared to Finland, Norway and Iceland. Despite of ...

  11. Fewer can be More: Nuclear Safety and Security Culture Self-Assessment in the Hungarian Public Ltd. for Radioactive Waste Management

    International Nuclear Information System (INIS)

    Horváth, K.; Solymosi, M.; Vass, G.

    2016-01-01

    The Hungarian regulator and operators show strong commitment towards robust nuclear safety and security culture. The paper discusses the evolution and the basis of the regulation of Hungarian safety and security culture. Because of security considerations nuclear safety incidents have always received and for sure will receive more publicity than malicious acts. That is probably the main reason behind that mostly nuclear safety incidents influence the common beliefs. This kind of primacy is noticeable as well in regulations and also in practice. Although there is a strong connection nuclear safety and security culture, their relationship has not been researched for a long time. The paper also presents an already achieved, combined nuclear safety and security culture survey type assessment. Survey is a well known type of organizational culture self assessment. The applied methods, relationship between these two cultures and of course some difficulties of the process are summarized. The presented method is appropriate to combine different guidance and characteristics to measure different attitude in a single survey. The method in practice is shown through the nuclear safety and security culture assessment conducted at Hungarian Public Ltd. Of Radioactive Waste Management. (author)

  12. Is the Secure Base Phenomenon Evident Here, There, and Anywhere? A Cross-Cultural Study of Child Behavior and Experts' Definitions

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J.; Peña, Paola P.; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M.; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J.; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the…

  13. Frost related dieback in Estonian energy plantations of willows in relation to fertilisation and pathogenic bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Cambours, M.A.; Nejad, P. [Department of Forest Mycology and Pathology, Swedish University of Agricultural Sciences, Box 7026, 750 07 Uppsala (Sweden); Heinsoo, K. [Institute of Zoology and Botany, Estonian Agricultural University, Riia 181, 51014 Tartu (Estonia); Granhall, U. [Department of Microbiology, Swedish University of Agricultural Sciences, Box 7025, 750 07 Uppsala (Sweden)

    2006-03-15

    Two 9-year old Estonian Salix plantations suffering from dieback were studied: one situated on poor mineral soil and divided into fertilised and unfertilised plots (Saare plantation) and another growing on a well-decomposed and nitrogen-rich organic soil, without fertiliser application (Kambja plantation). Bacteria from internal tissues of visually damaged shoots from seven clones were isolated in spring and autumn. The strains were subsequently biochemically characterised and tested for ice nucleation activity and pathogenicity on Salix. Some strains were also analysed with 16S rRNA. High numbers of culturable bacteria were found, belonging mainly to Erwinia, Sphingomonas, Pseudomonas and Xanthomonas spp. Fertilised plots were significantly more colonised by bacteria than unfertilised plots and also more extensively damaged, showing a lower density of living plants after 7 years of culture. More ice nucleation active (INA) strains were found in Saare fertilised plots and at Kambja than in Saare unfertilised plots. Likewise, most pathogenic strains were isolated from Saare fertilised plots and from Kambja. For some of the willow clones studied, dieback appeared to be related to both clonal frost sensitivity and abundance of INA and pathogenic bacteria. The plantations probably suffered from the presence of high amounts of pathogens and from frost related injuries aggravated by INA bacteria. Most probably the fertilisation at Saare and the nitrogen-rich soil at Kambja created a favourable environment for bacterial development and led to high dieback levels after the first harvest. (author)

  14. Smoking habits and attitudes towards smoking among Estonian physicians.

    Science.gov (United States)

    Pärna, K; Rahu, K; Rahu, M

    2005-05-01

    This study examined the smoking habits and attitudes towards smoking among Estonian physicians. Cross-sectional data for 2668 physicians were gathered by a self-administered postal survey. The current smoking prevalence was 24.9% for male physicians and 10.8% for female physicians. The percentages of ex-smokers were 32.9 and 16.8%, respectively. Smoking prevalence among physicians was below the levels reported for the highest educational bracket of the total population in Estonia. Non-smoking physicians had more unfavourable views towards smoking than those who smoked. The majority of physicians were aware of the association between smoking and various diseases, with significant differences between smokers and non-smokers. Non-smoking physicians were more active in asking patients about smoking habits than those who smoked. Most Estonian physicians, especially those who smoked, failed to perceive themselves as positive role models. This study found a lower prevalence of smoking among physicians compared with the general population, and demonstrated the impact of personal smoking on physicians' attitudes towards smoking. The results provide an important challenge to medical education in Estonia.

  15. Development of a breeding objective for Estonian Holstein cattle

    Directory of Open Access Journals (Sweden)

    E. PÄRNA

    2008-12-01

    Full Text Available Economic weights for milk carrier (water plus lactose, fat and protein yields, calving interval, age at first service, interval between the first service and conception of heifers and length of productive life of Estonian Holsteins were estimated under assumed milk production quota and for non-quota conditions. A bio-economic model of an integrated production system of a closed herd was used. Economic values of milk carrier yield and length of productive life differed between quota and non-quota conditions, but there were only minor differences between those marketing systems in economic values for functional traits. The standardised economic values of the most important traits varied in magnitude between18 to 81% of the economic value for milk yield. Discounting had a substantial impact on the economic value of length of productive life. When defining the breeding objective for Estonian Holstein, the interval between the first service and conception of heifers, and the length of productive life should be included in the breeding goal along with the traits with the highest economic value, milk, fat and protein yield. In the optimum breeding objective, relative weights of production vs. functional traits were 79 and 21%, respectively.;

  16. Acquisition of noun derivation in Estonian and Russian L1

    Directory of Open Access Journals (Sweden)

    Reili Argus

    2018-04-01

    Full Text Available Acquisition of derivation is not a well-studied area in first language research and a comparative approach to the acquisition of derivation in different languages doesn’t exist. There is no information on how a child acquires derivation in a language with a rich and regular system of derivational patterns, or in a language where derivation is productive, but the system of derivational patterns is opaque. According to general ideas of complexity in a language, the child should start to use simplex stems first and, only after that, complex ones, that is, complexity should increase in the course of acquisition. Our paper is intended to address these issues, based on longitudinal child data from typologically different languages, Estonian and Russian. The results revealed significant differences in the acquisition of noun derivation in the two languages under observation. The system of noun derivation is acquired at a faster pace in Russian, while Estonian children have far fewer noun derivatives in their speech and they use different derivation suffixes with less regularity. Even so, the so-called building block model may be applied for both languages only partially.

  17. Rahvusliku ajaloo tõlgendusi eesti draamas ja teatris 1970.–1980. aastatel. Interpretations of National History in Estonian Drama and Theatre in the 1970s–1980s

    Directory of Open Access Journals (Sweden)

    Piret Kruuspere

    2012-04-01

    Full Text Available According to theatre scholar Freddie Rokem, theatre portraying or performing historical events is seeking to overcome both the separation and the exclusion from the past, as well as ’striving to create a community where the events from this past will matter again’. This article covers the topic of interpretations of national history in Estonian theatre and in original dramaturgy during the Soviet era, with the focus on aspects like national self-reflection and the relationship to the common past. The main focus is on the 1970s, with examples from Rein Saluri’s, Mati Unt’s and Jaan Kaplinski’s drama productions. During the period in question, re-tellings of national history on Estonian theatre stages were clothed in metaphors, allusions and secret codes – Aesopian language. Within the Soviet cultural context, I analyse if and to what extent theatre of the time displayed resistance, political theatre or social allegory. Theatre was also connected with the principle of playing or playfulness, which on one hand indicates national resistance, national endurance, and a certain survival strategy, but on the other hand indicates the Estonian as being an involuntary homo ludens – the Playing Man, who through various enforced roles is trying to adjust to the whirlwinds of history. Saluri’s first play, the intellectual drama Külalised (The Guests, opens with an allusion to a drama classic the world over, William Shakespeare’s Hamlet, adding a powerful national-symbolic background to the play. The role-play which permeates and structures the play (The Host–The Guest however, displays allegorical references to changes in the status and self-image of Estonians. In Unt’s play Peaproov (Dress Rehearsal, the principle of playing/acting sheds ironic light on the makers of an historical film and their readiness to create superficially flashy interpretations at any cost: this take acts as an estranging and generalising reflection in a context

  18. Estonian horticultural peat marketing: sales promotion and price formation. 2. part

    International Nuclear Information System (INIS)

    Hammer, Hele

    1999-01-01

    When forming prices, Estonian peat companies' decisions should be based on marginal cost analysis. Unfortunately most Estonian companies sell peat to intermediaries and cannot influence its price. Estonian peat producers have to choose between either selling peat directly or selling through a central marketing organization. Both systems have their pros and cons. Direct selling gives more freedom to individual producers but is more risky. Central marketing makes cost saving possible and is more effective and stable, but may alienate producers from clients and markets. Whichever marketing system Estonian peat companies choose, the most important elements in their marketing strategy should be: careful market analysis, personal sales, attending trade shows, catalogues, quality service and offering transportation services. (author)

  19. Serological evidence of exposure to globally relevant zoonotic parasites in the Estonian population

    DEFF Research Database (Denmark)

    Lassen, Brian; Janson, Marilin; Viltrop, Arvo

    2016-01-01

    We investigated Estonian population and its selected subgroups for serological evidence of exposure to Ascaris lumbricoides, Echinococcus spp., Taenia solium, Toxocara canis, Toxoplasma gondii, and Trichinella spiralis. Serum samples from 999 adults representing general population, 248 children a...

  20. [Marge Rennit. Eesti muuseumid / Estonian museums] / Tapio Mäkeläinen

    Index Scriptorium Estoniae

    Mäkeläinen, Tapio

    2009-01-01

    Tutvustus: Eesti muuseumid = Estonian museums / [Eesti Muuseumiühing ; koostaja Marge Rennit ; tõlkija Tiina Mällo ; toimetaja Ivi Tammaru ; eessõna: Piret Õunapuu ; kujundaja Marek Allvee]. Tallinn : Oomen, 2008

  1. Problems of contemporary ecology. Temporal changes in Estonian nature and environment

    International Nuclear Information System (INIS)

    Frey, T.

    1997-01-01

    This conference was held 8-9 May 1997 at Tartu, Estonia. The proceedings of the 7. Estonian Conference in Ecology contain the results of mostly original research in environmental science, conservation and natural philosophy

  2. OneDHS: The Department of Homeland Security’s Organizational Culture

    Science.gov (United States)

    2012-04-27

    success stories. The first concerns New York City in the 1990s and the second highlights the Walt Disney Company and its chain of excellence. Both...difference that other actions were unable to produce. Walt Disney Company In contrast to a culture that has evolved over a number of years is a culture...designed from day one and constantly reinforced day in and day out for the last ninety years. The Walt Disney Company is an example of a culture

  3. Understanding the cultures of fishing communities: a key to fisheries management and food security

    National Research Council Canada - National Science Library

    McGoodwin, James R

    2001-01-01

    .... The paper suggests methods that might help fisheries managers to obtain reliable information about fishing cultures in an ethical manner, including the rapid acquisition of important information...

  4. Regulating edible insects: the challenge of adressing food security, nature conservation, and the erosion of traditional food culture

    DEFF Research Database (Denmark)

    Halloran, Afton Marina Szasz; Vantomme, Paul; Hanboonsong, Y.

    2015-01-01

    Entomophagy is a common practice in many regions of the world but there are few examples of national regulations that govern insects for human consumption. Where entomophagy is not common, the current regulatory discourse focuses primarily on food safety and consumer protection. In countries where...... species, they do not appear explicitly in dietary guidelines. Although food safety is a major concern, it can undermine the importance of nature conservation, traditional food culture, food security, and potential economic development. Thus, entomophagy should be viewed holistically and development...

  5. Walk the Talk: Progress in Building a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-31

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  6. Walk the Talk: Progress in Building a Supply Chain Security Culture

    International Nuclear Information System (INIS)

    Hund, Gretchen

    2016-01-01

    Pacific Northwest National Laboratory (PNNL) has engaged industry to ''go beyond compliance'' for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  7. Renewable energy sources and Estonian national interests

    International Nuclear Information System (INIS)

    Veski, Rein

    2002-01-01

    There is only one national level document, The Long-term National Development Plan for the Fuel and Energy sector, regulating the development of renewable energy for Estonia. It was approved by the Parliament (Riigikogu) in 1998. This document planned a 2/3 (66,7%) increase in the share of renewable (according to the document: peat, biofuels and other renewables) to the year 2010 against 1996. At the same time a decrease of the share of domestic oil shale was planned 1/5 to the year 2010 against 1995. That means the use of domestic energy sources, both renewable and non-renewable, will decrease by 16,8% altogether. In reality the rapid projected growth of renewables in Estonia (+66,7% between 1996 and 2010) was changed with decrease of 20% by 2000. So the security of supply must shift to the first place in Estonia. It is also an issue of national sovereignty. Estonia is rich in renewable energy sources, mainly in wood, peat and wind, to achieve the goals set in the National Development Plan. Forest resources amount 352,7, total felling 6,44, allowed felling 7,81 million cubic meters solid volume in 2000. The future of fuel peat usage in Estonia is uncertain, as most of the EU member states, which have burned up their peat resources and/or drained their mires do not consider peat as a renewable fuel. Obviously Estonia has to explain its opinion about the renewability of its resources. Although progress is needed in all directions of additional use of all renewable energy sources in tactical consideration finance must be directed first to guarantee better use of wastes of woodworking and timber industry

  8. Is the secure base phenomenon evident here, there, and anywhere? A cross-cultural study of child behavior and experts' definitions.

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J; Peña, Paola P; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the organization of children's behavior in naturalistic settings. Children (N = 547) were 10-72 months old. Child development experts (N = 81) from all countries provided definitions of optimal child secure base use. Findings indicate that children from all countries use their mother as a secure base. Children's organization of secure base behavior was modestly related to each other both within and across countries. Experts' descriptions of the optimally attached child were highly similar across cultures. © 2013 The Authors. Child Development © 2013 Society for Research in Child Development, Inc.

  9. Psychological culture of a class teacher as the foundation of modern schoolchildren’s psychological security

    Directory of Open Access Journals (Sweden)

    Tatyana I. Kulikova

    2012-01-01

    Full Text Available This article discusses the role that psychological culture of class teacher plays in theestablishment and maintenance of psychological safety in a modern schoolchild.The problem of protection against psychological abuse within the educational environmentof a school is particularly important in the current socio-cultural realm.The article analyzes many pedagogical and psychological studies regarding theproblem of psychological education of teachers. It discusses contradiction betweenthe objective need to create a psychologically safe learning environmentand the unwillingness of teachers to work on it due to low own level of psychologicalculture. The author introduced the original structural model of psychologicalculture of a class teacher, representing the integration of the three main components:the culture of pedagogical refl ection, emotional culture and culture ofpedagogical infl uence.

  10. Understanding Information Security Culture in an Organization: An Interpretive Case Study

    Science.gov (United States)

    Bess, Donald Arlo

    2012-01-01

    Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…

  11. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The first section looks into the past actions and strategic culture of Russia to determine if there exists a threat that Russia will deny energy resources to European countries for political or economic gain...

  12. Supervision, mentorship and peer networks: how Estonian early career researchers get (or fail to get support

    Directory of Open Access Journals (Sweden)

    Jaana Eigi

    2018-03-01

    Full Text Available The paper analyses issues related to supervision and support of early career researchers in Estonian academia. We use nine focus groups interviews conducted in 2015 with representatives of social sciences in order to identify early career researchers’ needs with respect to support, frustrations they may experience, and resources they may have for addressing them. Our crucial contribution is the identification of wider support networks of peers and colleagues that may compensate, partially or even fully, for failures of official supervision. On the basis of our analysis we argue that support for early career researchers should take into account the resources they already possess but also recognise the importance of wider academic culture, including funding and employment patterns, and the roles of supervisors and senior researchers in ensuring successful functioning of support networks. Through analysing the conditions for the development of early career researchers – producers of knowledge – our paper contributes to social epistemology understood as analysis of specific forms of social organisation of knowledge production.

  13. The Dominance of Indirect Taxes in Estonian State Budget

    Directory of Open Access Journals (Sweden)

    Olev Raju

    2013-01-01

    Full Text Available Recession has sharply erected the question of tax burden and the optimal proportion of different kinds of taxes among the incomes of the budget. Indirect taxes and consumption taxes, which proportion is different according to different methodologies, dominate in Estonian state budget. The buoyancy of a tax system based on taxes of that kind is especially weak during the recession. Difficulties concerning the incomes of budget have arisen the necessity for lifting taxes, which is possible as the tax burden is low now. But a sharp question of the optimal level of taxes is going to be raised. A formula for indirect tax optimum according to Ramsey taxes and Slutski decomposition has been proposed in the article.

  14. Walk the Talk: How PNNL is developing a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States). Center for Global Security

    2015-09-30

    For the past decade, a team at the Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices in order to understand their business and to build awareness around best practices to ensure security of goods and information along their supply chains. As a result, PNNL has identified seven indicators that a company can adopt as part of their commitment to nonproliferation ideals.

  15. Walk the Talk: How PNNL is developing a Supply Chain Security Culture

    International Nuclear Information System (INIS)

    Hund, Gretchen

    2015-01-01

    For the past decade, a team at the Pacific Northwest National Laboratory (PNNL) has engaged industry to ''go beyond compliance'' in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices in order to understand their business and to build awareness around best practices to ensure security of goods and information along their supply chains. As a result, PNNL has identified seven indicators that a company can adopt as part of their commitment to nonproliferation ideals.

  16. Individual and work-related risk factors for musculoskeletal pain: a cross-sectional study among Estonian computer users.

    Science.gov (United States)

    Oha, Kristel; Animägi, Liina; Pääsuke, Mati; Coggon, David; Merisalu, Eda

    2014-05-28

    Occupational use of computers has increased rapidly over recent decades, and has been linked with various musculoskeletal disorders, which are now the most commonly diagnosed occupational diseases in Estonia. The aim of this study was to assess the prevalence of musculoskeletal pain (MSP) by anatomical region during the past 12 months and to investigate its association with personal characteristics and work-related risk factors among Estonian office workers using computers. In a cross-sectional survey, the questionnaires were sent to the 415 computer users. Data were collected by self-administered questionnaire from 202 computer users at two universities in Estonia. The questionnaire asked about MSP at different anatomical sites, and potential individual and work related risk factors. Associations with risk factors were assessed by logistic regression. Most respondents (77%) reported MSP in at least one anatomical region during the past 12 months. Most prevalent was pain in the neck (51%), followed by low back pain (42%), wrist/hand pain (35%) and shoulder pain (30%). Older age, right-handedness, not currently smoking, emotional exhaustion, belief that musculoskeletal problems are commonly caused by work, and low job security were the statistically significant risk factors for MSP in different anatomical sites. A high prevalence of MSP in the neck, low back, wrist/arm and shoulder was observed among Estonian computer users. Psychosocial risk factors were broadly consistent with those reported from elsewhere. While computer users should be aware of ergonomic techniques that can make their work easier and more comfortable, presenting computer use as a serious health hazard may modify health beliefs in a way that is unhelpful.

  17. Material security, life history, and moralistic religions: A cross-cultural examination

    Science.gov (United States)

    Ross, Cody T.; Apicella, Coren; Atkinson, Quentin D.; Cohen, Emma; McNamara, Rita Anne; Willard, Aiyana K.; Xygalatas, Dimitris; Norenzayan, Ara; Henrich, Joseph

    2018-01-01

    Researchers have recently proposed that “moralistic” religions—those with moral doctrines, moralistic supernatural punishment, and lower emphasis on ritual—emerged as an effect of greater wealth and material security. One interpretation appeals to life history theory, predicting that individuals with “slow life history” strategies will be more attracted to moralistic traditions as a means to judge those with “fast life history” strategies. As we had reservations about the validity of this application of life history theory, we tested these predictions with a data set consisting of 592 individuals from eight diverse societies. Our sample includes individuals from a wide range of traditions, including world religions such as Buddhism, Hinduism and Christianity, but also local traditions rooted in beliefs in animism, ancestor worship, and worship of spirits associated with nature. We first test for the presence of associations between material security, years of formal education, and reproductive success. Consistent with popular life history predictions, we find evidence that material security and education are associated with reduced reproduction. Building on this, we then test whether or not these demographic factors predict the moral concern, punitiveness, attributed knowledge-breadth, and frequency of ritual devotions towards two deities in each society. Here, we find no reliable evidence of a relationship between number of children, material security, or formal education and the individual-level religious beliefs and behaviors. We conclude with a discussion of why life-history theory is an inadequate interpretation for the emergence of factors typifying the moralistic traditions. PMID:29513766

  18. Strategic Culture and Energy Security Policy of South Korea: The Case of Nuclear Energy

    International Nuclear Information System (INIS)

    Kim, Taehyun

    2012-01-01

    The U. S. - ROK Civil Nuclear Cooperation Agreement highlights the dilemma of contemporary international non-proliferation regime. Non-Proliferation Treaty has represented an awkward balance between the ideal of nuclear energy and the reality of nuclear weapons. It is neither complete nor effective. It is not complete because it does not cover all the issues with respect to nuclear energy, which have become increasingly complex. Nuclear security, for example, is not an issue that it addresses, and it is precisely why President Obama called for the unprecedented Nuclear Security Summit. It is not effective. It has failed in preventing proliferation of nuclear weapons states, India, Israel, Pakistan and North Korea, who remain outside of the regime. An international regime is defined as 'a set of principles, norms, rules, and decision-procedures around which actors' expectations converge. The extents to which actors' expectations converge and forceful measures in the name of international community against any violation are justified will measure its effectiveness. NPT regime is sub-par on that. The world is in dire need of a comprehensive and integrated regime for nuclear energy regime, where proliferation, security, and safety concern are effectively addressed. South Korea, if it truly wants to become a key player in the field, has to be one of its architects. The ability to meet the challenge of revising Civil Nuclear Cooperation Agreement will show if it is a qualified architect

  19. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  20. The Ultimate Cookbook for Cultural Managers : Social Security in International Context

    NARCIS (Netherlands)

    D. Molenaar (Dick)

    2017-01-01

    markdownabstractActivities of artists are rarely limited to their own country. Nowadays artists (and other cultural professionals) are very mobile and easily accept a job offer or an activity abroad. All these situations show a vibrant and highly mobile sector that is not defined by borders.

  1. Evaluating U.S. and Chinese Cyber Security Strategies Within a Cultural Framework

    Science.gov (United States)

    2016-04-01

    analysis of Chinese culture in warfare studies. They find that Chinese convention “respects inaction”28 and the teachings of Sun Tzu , thus favoring the...15 Bibliography ...AY16 16 Bibliography Ehsan Ahrari. “Transformation of America’s Military and Asymmetric War.” Comparative Strategy 29, no. 3 (2010): 223-244

  2. Cyber Culture and Personnel Security: Report 2 - Ethnographic Analysis of Second Life

    Science.gov (United States)

    2011-07-01

    concept of cultural relativism . This principle states that an individual or group’s behaviors and beliefs should be interpreted through the lens of...behaviors. Residents view cyber sexual relations as being less morally compromising than real-life sex, because they lack “I can say that I have had

  3. Safeguards Culture

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Mladineo, Stephen V.

    2012-07-01

    The concepts of nuclear safety and security culture are well established; however, a common understanding of safeguards culture is not internationally recognized. Supported by the National Nuclear Security Administration, the authors prepared this report, an analysis of the concept of safeguards culture, and gauged its value to the safeguards community. The authors explored distinctions between safeguards culture, safeguards compliance, and safeguards performance, and evaluated synergies and differences between safeguards culture and safety/security culture. The report concludes with suggested next steps.

  4. Ärkamisaeg, Noor-Eesti ja miski nende vahel. Eesti kirjandusloo küsimusi Juhan Kunderi näitel / National Awakening , Young Estonia and Something In Between. Problems of Estonian Literary History in the Example of Juhan Kunder

    Directory of Open Access Journals (Sweden)

    Pille-Riin Larm

    2013-12-01

    Full Text Available According to the long-standing periodisation of Estonian literary history, the Estonian National Awakening that started in the mid-19th century was followed by a period of lesser creativity and originality, which ended only with the breakthrough of the modernist Young Estonia group in 1905. In the canon of Estonian literature, Juhan Kunder (1852–1888, today known primarily for his fairy tales, one play and lyrics of one song, is placed in this intermediate period. This article first introduces the significance of Kunder in his time. He was a popular writer and a wellknown pedagogue, and a younger contemporary of the great figures of the National Awakening. As a critic, magazine editor and literary historian, his most important contribution to literary history was in the development of literary thought. It seems that several precedents that have been attributed to the Young Estonia group, e.g., valuing originality, writing well-argued criticism, etc., actually originated from an earlier period. Based on these observations, the author of this article believes that the current structure of Estonian literary history is not adequately justified, and she points out a semantic shift in the terms in use. It is true that Kunder was largely an epigone of his predecessors, but in the positive sense of the term, meaning that he continued their mission. Similarly, Kunder’s predecessor, the ‘first Young Estonian’ Kreutzwald, and a representative of his 20th-century successors, Friedebert Tuglas, were also epigones. During the period of Russification that started during his era, Kunder’s attitudes could be considered progressive. Kunder was also a 19th-century contemporary of the Young Estonia group and a true Young Estonian in the original sense of the term which emerged in this period: a Young Estonian introduced new initiatives and was a leader of the national movement. Epigonism and membership in Young Estonia can be seen as the keys to cultural

  5. Jäätmetega kimpus Estonian Cell annab muda põldudele kompostiks / Ulvar Käärt

    Index Scriptorium Estoniae

    Käärt, Ulvar, 1982-

    2007-01-01

    Kundas asuv Estonian Celli tehas jagab ümberkaudsetele talunikele jäätmetest lahtisaamiseks kompostimissegu. Seadused ei sätesta, kuidas Estonian Cellis tekkivaid jäätmeid töödelda. Kommenteerib Peeter Eek: Aasta läbi ei saa muda põllule viia

  6. The Category of Time in Fairy Tales: Searching for Folk Calendar Time in the Estonian Fairy Tale Corpus

    Directory of Open Access Journals (Sweden)

    Mairi Kaasik

    2011-03-01

    Full Text Available The article examines how folk calendar holidays are represented in Estonian fairy tales. It introduces some views presented in folklore studies about the concept of time in fairy tales and finds parallels with them in the Estonian context. The analysis relies on the digital corpus of Estonian fairy tales (5400 variants, created from the texts found in the Estonian Folklore Archives by the Fairy Tale Project of the Department of Estonian and Comparative Folklore, University of Tartu. Folk calendar holidays occur in Estonian fairy tales relatively seldom; most often these are holidays that occupy a significant place in the Estonian folk calendar (Christmas, St. John’s Day, Easter, St. George’s Day. Calendar holidays are notably mentioned more often in tale types which remain on the borderline between the fairy tale and the legend or the fairy tale and the religious tale. In Estonian fairy tales, calendar holidays are used on three levels of meaning: (1 the holiday is organically associated with the tale type; it has an essential role in the plot of the tale; (2 to a certain extent, the holiday could be replaced by another holiday having an analogous meaning; (3 the holiday forms an unimportant or occasional addition to the tale.

  7. Musical Practices and Methods in Music Lessons: A Comparative Study of Estonian and Finnish General Music Education

    Science.gov (United States)

    Sepp, Anu; Ruokonen, Inkeri; Ruismäki, Heikki

    2015-01-01

    This article reveals the results of a comparative study of Estonian and Finnish general music education. The aim was to find out what music teaching practices and approaches/methods were mostly used, what music education perspectives supported those practices. The data were collected using questionnaires and the results of 107 Estonian and 50…

  8. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  9. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The third section investigates the importance of revenues that Russia receives from consumption of oil and natural gas exports to Europe on their Gross National Product and economic growth for the future. By understanding Russia's strategic culture and the interdependence of European demand and Russian supply, conclusions are made that determine the threat, risk, and circumstances that Russia will deny energy resources to European countries.

  10. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  11. Radon in Estonian dwellings - Results from a National Radon Survey

    Energy Technology Data Exchange (ETDEWEB)

    Pahapill, Lia; Rulkov, Anne; Rajamaee, Raivo [Estonian Radiation Protection Centre (Kiirguskeskus), Tallinn (Spain); Aakerblom, Gustav [Swedish Radiation Protection Authority, Stockholm (Sweden)

    2003-10-01

    A countrywide survey of radon concentrations in Estonian dwellings was carried out during the period 1998-2001. The survey formed a part of the cooperation program on radiation protection between the Estonian Radiation Protection (Kiirguskeskus) Centre and the Swedish Radiation Protection Authority (SSI). The survey included measurements in a number of dwellings representative for Estonia in detached houses and multifamily buildings (only dwellings on the bottom floor were included in the survey). Altogether, radon concentrations were measured in 515 dwellings, a number large enough to be statistically significant. All measurements were made with alphatrack film detectors of the same type that SSI uses in Sweden. The measurements were made during a 2-3 month period during the winter half-year. Two detectors were used in each dwelling. In Estonia there are 0.17 million dwellings in detached houses and 0.45 million in multi apartment buildings. Of the 1.26 million inhabitants in Estonia. 0.36 million live in detached houses and 0.90 million in multi apartment buildings. Most of the latter were built during the Soviet occupation. Of the dwellings in multifamily buildings 30 % are assumed to be situated on the first floor. The mean radon concentration in dwellings in detached hoses, according to the survey results, is 103 Bq/m{sup 3}, in dwellings on the bottom floor in multi apartment buildings it is 78 Bq/m{sup 3}. In 1% of the dwellings the radon concentration exceeded 400 Bq/m{sup 3}. The highest radon concentration found in the study was 1040 Bq/m{sup 3}. Based on the assumption that the average radon concentration in the dwellings in multi-apartment buildings that are not situated on the bottom floor is 30 Bq/m{sup 3}, and that these dwellings constitute 70% of all dwellings in multi apartment buildings, the mean radon concentration in dwellings in multi apartment buildings is calculated to be 44 Bq/m{sup 3}. The mean value for all Estonia dwellings is calculated

  12. Radon in Estonian dwellings - Results from a National Radon Survey

    International Nuclear Information System (INIS)

    Pahapill, Lia; Rulkov, Anne; Rajamaee, Raivo; Aakerblom, Gustav

    2003-10-01

    A countrywide survey of radon concentrations in Estonian dwellings was carried out during the period 1998-2001. The survey formed a part of the cooperation program on radiation protection between the Estonian Radiation Protection (Kiirguskeskus) Centre and the Swedish Radiation Protection Authority (SSI). The survey included measurements in a number of dwellings representative for Estonia in detached houses and multifamily buildings (only dwellings on the bottom floor were included in the survey). Altogether, radon concentrations were measured in 515 dwellings, a number large enough to be statistically significant. All measurements were made with alphatrack film detectors of the same type that SSI uses in Sweden. The measurements were made during a 2-3 month period during the winter half-year. Two detectors were used in each dwelling. In Estonia there are 0.17 million dwellings in detached houses and 0.45 million in multi apartment buildings. Of the 1.26 million inhabitants in Estonia. 0.36 million live in detached houses and 0.90 million in multi apartment buildings. Most of the latter were built during the Soviet occupation. Of the dwellings in multifamily buildings 30 % are assumed to be situated on the first floor. The mean radon concentration in dwellings in detached hoses, according to the survey results, is 103 Bq/m 3 , in dwellings on the bottom floor in multi apartment buildings it is 78 Bq/m 3 . In 1% of the dwellings the radon concentration exceeded 400 Bq/m 3 . The highest radon concentration found in the study was 1040 Bq/m 3 . Based on the assumption that the average radon concentration in the dwellings in multi-apartment buildings that are not situated on the bottom floor is 30 Bq/m 3 , and that these dwellings constitute 70% of all dwellings in multi apartment buildings, the mean radon concentration in dwellings in multi apartment buildings is calculated to be 44 Bq/m 3 . The mean value for all Estonia dwellings is calculated to be 60 Bq/m 3 . Using

  13. Kolm Eesti Robinsoni: Daniel Defoe romaan eesti tõlkes / Three Estonian Robinsons: Daniel Defoe’s Novel in Estonian Translation

    Directory of Open Access Journals (Sweden)

    Ene-Reet Soovik

    2012-06-01

    acceptable during the Soviet times to curb the source text in translation while still claiming that it held the status of a representative translation; in 1950 the existence of omissions could even be frankly mentioned in the translator’s foreword. The content of the omissions correlated with topics disapproved of by the authorities of the time. The translation hailing from 1984 was, in comparison, less cautious and found it possible to include numerous elements missing from the earlier translation. The 2007 translation, however, appeared in an Estonia that had regained independence in 1991; thus, the novel’s text was published to the full. The two earlier translations were published as children’s literature at times when an acute need was felt in the society for such works. Children’s literature has also been considered more likely to be adapted to meet the needs of the target culture than works meant for adults. The 2007 translation seems to want to also engage a mature readership and follows the principles of a literary work’s integrity set out in the Berne Convention. Robinson himself as the main character has appeared to the Estonian reader in various guises: as an embodiment of quasi-Soviet labour valour, an incarnation of practical rationality of the Age of Reason, and finally as a person who also makes progress towards spiritual enlightenment. Thus, he can also be seen as an illustration of the major social change s that occurred in Estonia during the mid- and late 20th century.

  14. The Woman as Wolf (AT 409: Some Interpretations of a Very Estonian Folk Tale

    Directory of Open Access Journals (Sweden)

    Merili Metsvahi

    2013-12-01

    Full Text Available The article analyses tale type The Woman as Wolf, which is one of the most popular folk tales in the Estonian Folklore Archives and is represented there both in the form of a fairy tale and in the form of a legend. The vast majority of the versions of The Woman as Wolf were written down in the first part of the 20th century within Estonia and where recorded from Estonians. The article introduces the content of the tale, the origin of the first records from the early 19th century, and the dissemination area of the tale, which remains outside Western Europe: apart from the Estonian versions there are Sami, Karelian, Vepsian, Livonian, Latvian, Lithuanian, Russian, Ukrainian and Belarusian versions. While in almost all the Estonian versions the main protagonist is transformed into a wolf, in most of the versions written down in other areas and ethnic groups, another animal or bird replaces the wolf. The author is of the opinion that the Finnic area is central to the distribution of the folk tale The Woman as Wolf. The animal the woman is transformed into in the plot would not have been a wolf in earlier times. The article provides an explanation why the wolf is predominant in Estonian written sources. For that purpose the ways in which the wolf and werewolf were perceived in earlier Estonian folk belief are introduced. At the end of the article interpretation of the folk tale is provided. The author states that the plot and some of the motifs found in this folk tale reflect the difficulties women had in submitting to the norms and values of patriarchal order within their society.

  15. The figure of the teacher in Estonian school discourse

    Directory of Open Access Journals (Sweden)

    Ott Puumeister

    2014-10-01

    Full Text Available The article concerns itself with the figure of the teacher in Estonian society. We do not concentrate on the educational system as a whole, but on one specific and crucial element in this apparatus - the teacher. We begin by offering a brief historical overview of the conditions of pedagogues in the 20th century before moving on to describe the adoption of neo-liberal free market policies since the 1990s and the effects these policies had and still have on education. Our main concern is to understand the teacher as an actor in power relations; to achieve this understanding we have selected as our examples 1 surveillance techniques in school environment that have direct relations to the state and the market; and 2 the 2012 educational workers' strike that made it quite clear that the teachers have been fixed to a position of wage workers. The overall and more abstract aim of the paper is to think about the social role of the teacher in Estonia.

  16. MODELLING DICLOFENAC AND IBUPROFEN RESIDUES IN MAJOR ESTONIAN SEASIDE CITIES

    Directory of Open Access Journals (Sweden)

    Erki Lember

    2016-06-01

    Full Text Available A theoretical model was developed to model the fate of two common pharmaceutical residues: diclofenac and ibuprofen in eight Estonian seaside cities that discharge their wastewaters directly into the Baltic Sea. The consumption rates of the active ingredients of diclofenac and ibuprofen from 2006-2014 were analysed. A decrease of 19.9% for diclofenac consumption and an increase of 14.1% for ibuprofen were found. The fate of diclofenac and ibuprofen were modelled by considering the human metabolism removal rate for pharmaceuticals, the removal rate of diclofenac and ibuprofen in activated sludge wastewater treatment plants (WWTP and annual flow rates. An average decrease from 1 to 0.8 µg/l (decrease of 20% for diclofenac and an increase from 11.4 to 13.4 µg/l (increase of 14.9% for ibuprofen for the concentration in the effluents of the WWTP were modelled. The model gives us a good overview about the theoretical concentrations of pharmaceutical residues in the environment and is helpful for evaluating environmental impacts.

  17. History of experimental psychology from an Estonian perspective.

    Science.gov (United States)

    Allik, Jüri

    2007-11-01

    A short review of the development of experimental psychology from an Estonian perspective is presented. The first rector after the reopening of the University of Dorpat (Tartu) in 1802, Georg Friedrich Parrot (1767-1852) was interested in optical phenomena which he attempted to explain by introducing the concept of unconscious inferences, anticipating a similar theory proposed by Herman von Helmholtz 20 years later. One of the next rectors, Alfred Wilhelm Volkmann (1800-1878) was regarded by Edwin Boring as one of the founding fathers of the experimental psychology. Georg Wilhelm Struve (1793-1864) played an essential part in solving the problem of personal equations. Arthur Joachim von Oettingen (1836-1920) developed a theory of music harmony, which stimulated his student Wilhelm Friedrich Ostwald (1853-1932) to study colour harmony. Emil Kraepelin (1856-1926), the founder of modern psychiatry, is by far the most important experimental psychologist who has worked in Estonia. His successor Wladimir von Tchisch (1855-1922), another student of Wilhelm Wundt, continued Kraepelin's work in experimental psychology. The lives of Wolfgang Köhler (1887-1967), who was born in Reval (Tallinn), and Oswald Külpe (1862-1915), who graduated from the University of Dorpat, extended the link between the history of experimental psychology and Estonia. Karl Gustav Girgensohn (1875-1925), the founder of the Dorpat School of the psychology of religion, stretched the use of experimental methods to the study of religious experience.

  18. Chernobyl is still haunting us. Radionuclides in Estonian mushrooms

    International Nuclear Information System (INIS)

    Martin, J.; Vilde, R.; Martin, L.; Aaspollu, J.; Tekko, S.

    1993-01-01

    The disaster that happened at the Chernobyl nuclear power station in 1986 caused a sharp rise in radioactive pollution over an extensive area in the region of the Baltic Sea. To estimate the distribution and the concentration of Cs-137 and Sr-90 in Estonian ecosystems, samples of mushrooms, mosses, lichens and the upper horizons of soil were gathered from 63 test sites during 1991. We were particularly interested in the amounts of radionuclides in mushrooms because these are used as food by people. Dangerously high radionuclide concentrations were found in mushrooms gathered in North-East Estonia. Heightened concentrations were registered here and there all over the territory of Estonia, especially in mushrooms gathered in Central and South-Western Estonia. The Cs-137 content in mushrooms depends on its content in other components of the ecosystems, first and foremost on the concentrations of radiocaesium in mosses and litter, which, therefore, can be used as indicators in prognostication the radioactive pollution of mushrooms in a certain region. As Cs-137 migrates between various ecosystem components, it is necessary to check the radioactivity of the forest products used for food for still a number of years to come. The Sr-90 level was low in all the ecosystem components examined. (author). 3 figs., 10 refs

  19. Cultural influence, economic security, and the fertility behavior of the Chinese in Canada

    Directory of Open Access Journals (Sweden)

    Tang, Zongli

    2001-01-01

    Full Text Available EnglishThis study explores interactions of cultural influence and economic insecurity and their effects on the fertility behavior of the Chinese in Canada. The importance of group context on the actions of individuals is measured through data from the PUST of the 1971 and1991 Canadian Censuses. Contextual analysis and random coefficient models are the major statistical tools employed to achieve the above objectives. The Chinese-Canadians are compared to the British-Canadians, who are used as the reference group. The findings suggest that Chinese reproductive norms with pronatalist endowments exert strong influence on the fertility behavior of the Chinese in Canada.This influence effectively counteracts the negative effects of economic insecurity and encourages Chinese immigrants to quickly recover their fertility deficit after the initial immigration stage. The effects of the origin culture on fertility diminish with increasing exposure to the host society.However, even among the native-born or Canadian-born Chinese, the influence of Chinese reproductive norms is still present though not as strong as among the foreign-born Chinese.FrenchCette étude explore les interactions de l'influence culturelle et de l'insécuritééconomique et leurs effets sur le comportement procréateur des Chinois auCanada. L'importance d'un contexte de groupe sur les actions des individus estmesurée au moyen de données provenant de la BEGD (bande-échantillon àgrande diffusion des recensements canadiens de 1971 et 1991. L'analysecontextuelle et les coefficients de modèles au hasard constituent les principauxoutils statistiques employés pour atteindre les objectifs susmentionnés. Les Sino-Canadiens sont comparés aux habitants de la Colombie-Britannique qui serventde groupe témoin. Les conclusions indiquent que les normes de reproduction àaction nataliste exercent une forte influence sur le comportement procréateur desChinois au Canada. Cette influence

  20. Euroopa-ihalusest taasiseseisvusperioodi autobiograafiates / European Identifications in Post-Soviet Estonian Life Writing

    Directory of Open Access Journals (Sweden)

    Leena Kurvet-Käosaar

    2016-12-01

    Full Text Available Teesid: Artikkel käsitleb Euroopat kui identiteedi ja minaduse sõlmpunkti ja enesevahenduse mõõdet kolmes omaelulookirjutuslikus teoses, mille autoritel on väljapaistev positsioon eesti (kirjanduskultuuris: Jaan Krossi „Kallid kaasteelised“ (2003a, 2008, Jaan Kaplinski „Isale“ (2003 ja Tõnu Õnnepalu „Flandria päevik“ (2007. Artikkel keskendub sellele, kuidas küsimused suhestumise trajektooridest Euroopa mäluruumiga haakuvad Krossi, Kaplinski ja Õnnepalu teostes esiletuleva enesemääratlusliku raamiga, neist lähtuvate vastastikuse kõnetuse võimaluste ja oma aegruumi tunnetuse pidepunktidega. Kuigi tegemist on eesti keeles ilmunud ning eesti kultuuriruumi lugejale suunatud teostega, seostuvad neis väljajoonistuvad enesemääratluse teljed viimastel aastakümnetel hoogustunud laiemate aruteludega ühtse Euroopa mäluraami ning identiteedi võimalikkusest ja selle toimimise tingimustest.   In recent years, the question of the possibility of a shared frame of memory and identity in Europe, its desired manifestations and practices for attaining it as well as its obstacles and limitations to it have gained prominence in scholarly debates in a number of disciplines. In terms of the division between the East and West of Europe, these discussions take as their starting point the collapse of the Soviet system in 1989 as well as the European Union enlargement in 2004. Far from uniform, the exceedingly complex and contrasting ranges of arguments have put forward a varied palette of perspectives and suggestions about possible and desirable implications of Europe in different socio-political and cultural configurations. Taking these debates as my starting point, the current article offers an analysis of three life writing works by contemporary Estonian authors and intellectuals, Kallid kaasteelised (Dear Fellow Travellers, 2003, 2008 by Jaan Kross, Isale (To My Father, 2003 by Jaan Kaplinski and Flandria päevik (The Flemish Diary

  1. The problems and development potential of revenue autonomy in Estonian municipalities. Kohalike omavalitsuste tuluautonoomia probleemid ja arenguvõimalused Eestis

    Directory of Open Access Journals (Sweden)

    Janno Reiljan

    2013-01-01

    Full Text Available In a regionally heterogeneous country like Estonia, it is a difficult task to create a local government revenue structure that guarantees even supply of public services across the entire country and, at the same time, revenue autonomy for the municipalities. In the theoretical part of the current article the suitability of different sources of own revenues are analysed in the context of Estonian municipalities. The empirical part of the article compares the financing principles of Estonian municipalities with other EU countries. Finally, the proportions of different own sources of revenues in the budgets of Estonian local governments are examined and suggestions are made for changing the current system

  2. The significance of enset culture and biodiversity for rural household food and livelihood security in southwestern Ethiopia

    NARCIS (Netherlands)

    Negash, A.; Niehof, A.

    2004-01-01

    The significance of enset (Ensete ventricosum Welw. Cheesman) for the food and livelihood security of rural households in Southwestern Ethiopia, where this crop is the main staple, raises two major questions. The first concerns the related issues of household food security and livelihood security

  3. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  4. Tiger in Focus--A National Survey of ICT in Estonian Schools

    Science.gov (United States)

    Toots, Anu; Laanpere, Mart

    2004-01-01

    Estonia has not participated in international studies of ICT in education, nor have there been any similar studies at the national level up until the year 2000. The first survey of ICT in Estonian schools was conducted after completion of the national school computerization programme called Tiger Leap. This paper focuses on the targeted responses…

  5. Alberta's Estonians 1899 - Present TLÜ Akadeemilises Raamatukogus / Sander Jürisson

    Index Scriptorium Estoniae

    Jürisson, Sander

    2014-01-01

    Tallinna Ülikooli Akadeemilises Raamatukogus on üleval näitus "Alberta's Estonians 1899 - Present", mis annab ülevaate Kanada Alberta provintsi eestlaste loost. Näitus valmis Alberta Eesti Kultuuripärandi Seltsi koostöös Alberta Provintsi Arhiivi Kultuuripärandi Osakonnaga Edmontonis

  6. The Perceived Impact of External Evaluation: The System, Organisation and Individual Levels-Estonian Case

    Science.gov (United States)

    Seema, Riin; Udam, Maiki; Mattisen, Heli; Lauri, Liia

    2017-01-01

    The purpose of this article is to provide an overview of how the employees of higher education institutions perceive the impact of external evaluations. The study was conducted using the concurrent mixed method and involved 361 employees from Estonian universities and professional higher education institutions. The results indicated that…

  7. The 2011 Estonian High School Language Reform in the Context of Critical Language Policy and Planning

    Science.gov (United States)

    Skerrett, Delaney Michael

    2014-01-01

    This paper seeks to situate Estonian language use and policy within the emerging field of critical language policy and planning (CLPP) by investigating the discourses that frame linguistic behaviour. This done by way of an analysis of a series of interviews carried out with key actors in language policy in Estonia. The discourses framing language…

  8. Estonian Airi ümber käib lehmakauplemine / Tõnu Lilleorg

    Index Scriptorium Estoniae

    Lilleorg, Tõnu

    2008-01-01

    Skandinaavia lennukompanii SAS saatis Eesti valitsusele kirja, milles teatab, et on nõus raskustes Estonian Airile lisainvesteeringuid tegema vaid siis, kui riik müüb SAS-ile oma osaluse, 34%. Vt. samas: SAS ei taha lennufirma eest maksta üle 150 miljoni. Diagramm: Majandusnäitajad, omanikud

  9. Estonian Cell peab suu kasumist puhtaks pühkima / Kaisa Tahlfeld, Katre Pilvinski

    Index Scriptorium Estoniae

    Tahlfeld, Kaisa

    2008-01-01

    Estonian Cell saatis valitsusele pöördumise, milles palutakse teha parandusi elektrienergiaga seonduvates seadustes, mis aitaksid ettevõtet energia hinnatõusu ajal. Elektri hinnatõusu tõttu on muutunud küsitavaks ka Nitroferti tehase edasine eksisteerimine

  10. Sustainable development outlooks of the Estonian energy sector for convergence with the European Union countries

    International Nuclear Information System (INIS)

    Laur, Anton; Tenno, Koidu; Soosaar, Sulev

    2002-01-01

    The article presents an overview of a research conducted in the Estonian Inst. of Economics and the Estonian Energy Research Inst. with the objectives to: analyse the dynamics of the main Estonian energy use indicators over the last 8-10 years with the background of general macroeconomics developments; compare these indicators with the respective energy indicators in the European Union Member States and Candidate Countries; evaluate Estonia's potential to catch up by the energy use efficiency (GDP energy intensity) of the average level of EU countries, modelling our possible development scenarios of GDP and TPES. The research results indicates several positive development tendencies (e.g. reduction of TPES and CO 2 emissions with the background of economic growth) in the Estonian energy sector, as well as convergence with the EU countries in terms of GDP energy intensity. Unfortunately, the model analysis results demonstrate that it takes a lot of time for Estonia to reach the current EU level - even under the most favourable GDP and TPES development conditions, 25-30 years. The primary reason is the very low level of our GDP per capita compared to the EU countries. (author)

  11. Estonian Vocational Teachers' Attitudes towards Inclusive Education for Students with Special Educational Needs

    Science.gov (United States)

    Rose, Richard; Kaikkonen, Leena; Koiv, Kristi

    2007-01-01

    This paper presents the findings from research conducted with two samples of teachers from Estonian Vocational Schools. The first sample comprised a group of teachers who had received professional development directly related to the management of students with special educational needs in vocational education settings. Their attitudes and…

  12. Russian-Estonian Economic and Investment Cooperation During the Crisis: Dynamics and Possibilities

    Directory of Open Access Journals (Sweden)

    Nevskaya Anastasia

    2015-06-01

    Full Text Available The article deals with the development in Russian-Estonian relations during the crises of 2007 and 2014, taking into consideration the balance between political and economic factors in the decision-making by Estonian government. A number of special aspects, trends and problems in trade and investment ties are detected. The aim of the study is to uncover key motivation behind the actions of both Russia and Estonia, to identify the drivers for economic and political development in the region, and to work out recommendations to adjust them. The questions put forward by the authors of this article could not be more topical at the time, when Russian economic situation is obviously getting worse and capital flight (to the neighboring EU Member States is likely to increase. The method of the study is comparative analysis of the impact on economic ties made by Russian-Estonian crisis of 2007 and the current international tension around Ukraine. The regional fossil fuel market and the possibilities of Gazprom involvement in its development are also analyzed. It is concluded that political motives are still important for Estonian decisionmaking, though they are balanced out by measures of business support (despite some of these measures being taken by the EU bodies. The role of political factor for the Russian side is increasing. It is acknowledged that there is a growing number of missed economic opportunities in the Russian Northwest.

  13. The Estonian diaspora in South-West Russia in the 1920—30s: migration results

    Directory of Open Access Journals (Sweden)

    Stupin Yuri

    2010-11-01

    Full Text Available This article analyses the spatial features of the settling of Russian Estonians in the Northwest region at the “zenith” of diaspora on the basis of 1920, 1926, and 1939 censuses. The author identifies the principal settling areas and points out the geographical preconditions for the rapid decline of the diaspora.

  14. Gender Advantages and Gender Normality in the Views of Estonian Secondary School Students

    Science.gov (United States)

    Kuurme, Tiiu; Kasemaa, Gertrud

    2015-01-01

    The aim of the study on Estonian secondary school students was to obtain an overview of the gender-related views and experiences of the everyday school life by students, and to analyse the school-related factors in the development of gender roles and gender-related expectations. We view gender equality as a central condition for social…

  15. Power without manpower: Forecasting labour demand for Estonian energy sector

    International Nuclear Information System (INIS)

    Meriküll, Jaanika; Eamets, Raul; Humal, Katrin; Espenberg, Kerly

    2012-01-01

    As energy demand and prices continue to grow, oil shale might help mitigate the energy crisis—it can widely be found all over the world but so far has not been widely used. Estonia is unique in the world for producing a large majority of energy out of oil shale and has been set as an example in numerous papers covering oil shale deposits, technology etc. This paper is the first to analyse oil shale energy related workforce and provides scenario forecasts of the labour demand for the Estonian energy sector in 2010–2020. The contribution of the paper is twofold. First, the paper provides a valuable insight into oil shale energy related workforce, enabling to take into consideration the educational needs in countries where oil shale industry might be set up. Second, methodology-wise, the paper relates labour demand and supply to different scenarios of energy production capacities. The results illustrate problems related to aging of the workforce in energy production. If the existing trends continue in educational attainment in Estonia, there will be a serious shortage of high-skilled engineering and manufacturing specialists. Our method provides a simple yet reliable enough way to check for such problems early enough. - Highlights: ► This paper analyses oil shale energy related workforce and provides scenario forecasts. ► This is the first study to investigate the workforce related to oil shale energy production. ► The main workforce-related problem in the sector is ageing of the workforce. ► Workers immigrating to the sector during the Soviet times are at the retirement age. ► There will be a serious shortage of engineers for energy sector in the near future.

  16. Legal Analysis of Constructing Network Security System --View of Network Security Culture%建立网络安全保障体系的法律思考——以网络安全文化为视角

    Institute of Scientific and Technical Information of China (English)

    王铁占; 安海兴

    2011-01-01

    The information network movement system frequency suffers the destruction, has the value information to steal repeatedly, is main threat which the current network security faces. Under the network security culture frame, through legislation, establishes the stan perfect network security legal li government by law function and be an urgent matter. the enhancement networking legislation and the safety control administration dard network security service industry development the legal framework, the ability system, raises the network user safety idea, the display morals in the so on, the establishment should to the threat network security safeguard system%信息网络运行系统频遭破坏导致有价值信息屡被窃取,是当前网络安全面临的主要威胁。在网络安全文化框架下,通过加强网络技术立法与安全管理行政立法,建立规范网络安全服务业发展的法律体系,完善网络安全法律责任制度,培养网络用户安全理念,发挥道德在法治中的作用,建立应对威胁的网络安全保障体系是当务之急。

  17. Bernhard Linde. Noor-Eesti vooriülem. Bernhard Linde. Leader of the Young Estonian Pack

    Directory of Open Access Journals (Sweden)

    Jaanus Kulli

    2012-04-01

    Full Text Available Bernhard Linde (1886–1954 was a recognized and prolific Estonian theatre critic of the first quarter of the 20th century, who mediated and propagated western as well as eastern European theatrical innovations. In addition, he was active as a literary and art critic, publisher, and proponent of libraries, to a modest extent he was a prose writer and poet. Unquestionably, however, Bernhard Linde’s most prominent role was as one of the founding members of the literary movement Young Estonia. He was the group’s first general manager; later on, he was the secretary of the Estonian Writers’ Association Young Estonia, and the chairman of the board of the Young Estonia Publishing House. Linde’s formal education culminated in graduation from Tartu University as a Slavic philologist; he was the only member of the Young Estonia group to demonstrate serious and sustained interest toward Slavic cultures and peoples. Linde was a contradictory figure, evoking a range of responses from his contemporaries: on the one hand, there was the unbelievably broad range of his participation in cultural life, his organizing skills and business instincts in directing publishing houses; on the other hand, a superficiality in his writings, his often rash and subjective style as a critic, and his financial intrigues. If one adds in Linde’s stubbornness, egocentrism, and intense spirit of protest, which often led to lawsuits, the outcome is the portrait of an extremely complicated, fascinating, and passionate man—both in his creative work and his personal life Linde guaranteed a place for himself in literary history through a small catch of texts: a few foundational essays (for example, on August Kitzberg, a translation of Balzac’s Le père Goriot, the essay collection Omad ja võõrad (Own and Foreign and a travel book focusing on the literature and theatre of eastern Europe (Loova Kesk-Euroopa Poole (Toward A Creative Central Europe. The prominent public

  18. Estonian Business Schooli magistriharidus nüüd ka koju kätte / Madis Habakuk

    Index Scriptorium Estoniae

    Habakuk, Madis

    2007-01-01

    Sügisest hakkab Estonian Business School koos Mainori Kõrgkooliga pakkuma magistriõpet majandushariduseta inimestele, kus soovijatel on võimalus õppida EBSi Master of Business Administration programmi järgi

  19. [Encapsulated voices : Estonian sound recordings from the German prisoner-of-war camps in 1916-1918] / Tõnu Tannberg

    Index Scriptorium Estoniae

    Tannberg, Tõnu, 1961-

    2013-01-01

    Arvustus: Encapsulated voices : Estonian sound recordings from the German prisoner-of-war camps in 1916-1918 (Das Baltikum in Geschichte und Gegenwart, 5). Hrsg. von Jaan Ross. Böhlau Verlag. Köln, Weimar und Wien 2012

  20. Väärikas Estonian Air jäi kampaaniaga hätta / Alyona Stadnik

    Index Scriptorium Estoniae

    Stadnik, Alyona

    2010-01-01

    Estonian Air müüs veebikaupluse cherry.ee kaudu soodsaid kinkekaarte. Vastuolu tekkis asjaolust, et nõudlus kinkekaartide järele oli suurem kui pakkumine. Lennukompanii katkestas soodsate kinkekaartide müügi

  1. The Rocky Road towards Professional Autonomy: The Estonian Journalists’ Organization in the Political Turmoil of the 20th Century

    Directory of Open Access Journals (Sweden)

    Epp Lauk

    2017-09-01

    Full Text Available This article attempts to explain the relationships between journalists, politics and the state from the perspective of collective autonomy, that of the professional organization of journalists. The case of Estonian Journalists’ Union demonstrates the complexity and historical contingency of professional autonomy of journalism. The development of the Estonian journalists’ organization occurred as a sequence of transformations from the Estonian Journalists’ Association to the Estonian Journalists’ Union to the Soviet type journalists’ union, and lastly to an independent trade union. This sequence was disrupted by several fatal breakdowns that changed not only the character of the association, but also professional values, the whole occupational ideology and the conditions of the existence of journalism as a profession in Estonia.

  2. Chemistry of the Estonian oil-shale kukersite

    Energy Technology Data Exchange (ETDEWEB)

    Kogerman, P N

    1931-01-01

    Estonian oil shale is one of the oldest and richest oil shales in the world. The deposits occur in the Middle-Ordovician strata having a total thickness of 2.2 meters. The ultimate composition of the kerogen varied within the following limits: carbon 76.5 to 76.7 percent, hydrogen 9.1 to 9.2 percent, nitrogen 0.2 to 0.4 percent, sulfur 1.6 to 2.2 percent, chlorine 0.5 to 0.7 percent, and oxygen (by difference) 11.2 to 12.2 percent. The composition of kukersite kerogen corresponds nearly to the empirical formula (C/sub 8/H/sub 11/O)n. One of the most significant differences between kukersite, coal, and lignite is the amount of alkali-soluble substances present. Kukersite has almost no humic acids. Samples of kukersite were brominated and chlorinated. The halogenated shales showed a solubility in absolute alcohol of 26 percent compared to only 0.31 percent for untreated shale. Enriched shale (4.5 percent ash) did not react with chlorine as much as did raw shale. Apparently the mineral matter acted catalytically during chlorination. The amount of soluble extract obtained by solvent treatment of kukersite ranged from 0.22 percent with chloroform to 2.20 percent with tetrachloroethane. Heat was the most effective agent for the depolymerization of kukersite kerogen. The percentage loss of weight due to drying in air was much less than in the presence of carbon dioxide. The results indicated that on drying in air, the powdered shale loses water and a volatile substance, probably the oxides of carbon, up to 80/sup 0/C. Carbon dioxide was also found to be present in the gases eliminated at the temperature of initial decomposition. Pulverized shale, heated for 6 hours at 220/sup 0/C, lost 2.6 percent of its weight; its solubility in carbon disulfide was 2.11 percent. Kukersite kerogen was formed from compounds that were resistent to bacteriological decomposition, such as waxes and resins, plus decomposition products of proteins, cellulose, and putrefaction products of

  3. Sources and distribution of trace elements in Estonian peat

    Science.gov (United States)

    Orru, Hans; Orru, Mall

    2006-10-01

    This paper presents the results of the distribution of trace elements in Estonian mires. Sixty four mires, representative of the different landscape units, were analyzed for the content of 16 trace elements (Cr, Mn, Ni, Cu, Zn, and Pb using AAS; Cd by GF-AAS; Hg by the cold vapour method; and V, Co, As, Sr, Mo, Th, and U by XRF) as well as other peat characteristics (peat type, degree of humification, pH and ash content). The results of the research show that concentrations of trace elements in peat are generally low: V 3.8 ± 0.6, Cr 3.1 ± 0.2, Mn 35.1 ± 2.7, Co 0.50 ± 0.05, Ni 3.7 ± 0.2, Cu 4.4 ± 0.3, Zn 10.0 ± 0.7, As 2.4 ± 0.3, Sr 21.9 ± 0.9, Mo 1.2 ± 0.2, Cd 0.12 ± 0.01, Hg 0.05 ± 0.01, Pb 3.3 ± 0.2, Th 0.47 ± 0.05, U 1.3 ± 0.2 μg g - 1 and S 0.25 ± 0.02%. Statistical analyses on these large database showed that Co has the highest positive correlations with many elements and ash content. As, Ni, Mo, ash content and pH are also significantly correlated. The lowest abundance of most trace elements was recorded in mires fed only by precipitation (ombrotrophic), and the highest in mires fed by groundwater and springs (minerotrophic), which are situated in the flood plains of river valleys. Concentrations usually differ between the superficial, middle and bottom peat layers, but the significance decreases depending on the type of mire in the following order: transitional mires - raised bogs - fens. Differences among mire types are highest for the superficial but not significant for the basal peat layers. The use of peat with high concentrations of trace elements in agriculture, horticulture, as fuel, for water purification etc., may pose a risk for humans: via the food chain, through inhalation, drinking water etc.

  4. [System construction of early warning for ecological security at cultural and natural heritage mixed sites and its application: a case study of Wuyishan Scenery District].

    Science.gov (United States)

    You, Wei-Bin; He, Dong-Jin; Qin, De-Hua; Ji, Zhi-Rong; Wu, Li-Yun; Yu, Jian-An; Chen, Bing-Rong; Tan, Yong

    2014-05-01

    This paper proposed a new concept of ecological security for protection by a comprehensive analysis of the contents and standards of world heritage sites. A frame concept model named "Pressure-State-Control" for early warning of ecological security at world heritage mixed sites was constructed and evaluation indicators of this frame were also selected. Wuyishan Scenery District was chosen for a case study, which has been severely disturbed by natural and artificial factors. Based on the frame model of "Pressure-State-Control" and by employing extension analysis, the matter-element model was established to assess the ecological security status of this cultural and natural world heritage mixed site. The results showed that the accuracy of ecological security early warning reached 84%. Early warning rank was I level (no alert status) in 1997 and 2009, but that in 2009 had a higher possibility to convert into II level. Likewise, the early-warning indices of sensitive ranks were different between 1997 and 2009. Population density, population growth rate, area index for tea garden, cultivated land owned per capita, level of drought, and investment for ecological and environmental construction were the main limiting factors to hinder the development of ecological security from 2009 to future. In general, the status of Wuyishan Scenery District ecological security was relatively good and considered as no alert level, while risk conditions also existed in terms of a few early-warning indicators. We still need to pay more attention to serious alert indicators and adopt effective prevention and control measures to maintain a good ecological security status of this heritage site.

  5. Pilk ingliskeelse kirjanduse tõlgetele 18. sajandi lõpust 20. sajandi algusveerandini / A Look at Estonian Translations of English Literature from the late 18th Century to the Early 20th Century

    Directory of Open Access Journals (Sweden)

    Krista Mits

    2012-06-01

    Full Text Available The aim of this article is to provide an overview of translations of English literature into Estonian between 1779 and 1917. There is an attempt to analyse the texts by describing them on the basis of, or in their departure from, a text or texts that chronologically and logically precede them. The discussion includes the nature of the transfer and the changes that have been made to the text, either because they existed in the source or mediating text or because of the expectations or requirements in the receptor, i.e. Estonian culture. The translated texts are seen in their historical-cultural context. For the analysis, a corpus of translated texts – religious, fiction, drama and non-fiction (published in a book form was compiled. The general orientation of Estonia until the 1880s was to the German cultural sphere. So the first translations of English literature were made via a mediating language, which was German. English Puritan writers were introduced by the Pietist missionaries with the aim of spreading their teachings in the second half of the 18th century. At about the same time the narrative element was introduced into stories with religious content. Some internationally popular stories, e.g. the Inkle and Yarico story, later robinsonades, stories of slavery and plant at ion life, as well as Amer ican Indian st or ies wer e also t r anslat ed fr om Ger man. However, until  1875  ver  y  few  translations  of  English  literature  into  E stonian were  published.  The  last quarter of the 19th century saw an explosion in literary production: there was a substantial increase  both  in  the  number  of  translations  of  English  literature  into  E stonian  as  well  as diversification of genres. This continued into the first decade of the 20th  centur y,  when  the sociopolitical situation in Estonia changed. In addition, books came to be translated directly from  English,  although  many  translations

  6. Culture.

    Science.gov (United States)

    Smith, Timothy B; Rodríguez, Melanie Domenech; Bernal, Guillermo

    2011-02-01

    This article summarizes the definitions, means, and research of adapting psychotherapy to clients' cultural backgrounds. We begin by reviewing the prevailing definitions of cultural adaptation and providing a clinical example. We present an original meta-analysis of 65 experimental and quasi-experimental studies involving 8,620 participants. The omnibus effect size of d = .46 indicates that treatments specifically adapted for clients of color were moderately more effective with that clientele than traditional treatments. The most effective treatments tended to be those with greater numbers of cultural adaptations. Mental health services targeted to a specific cultural group were several times more effective than those provided to clients from a variety of cultural backgrounds. We recommend a series of research-supported therapeutic practices that account for clients' culture, with culture-specific treatments being more effective than generally culture-sensitive treatments. © 2010 Wiley Periodicals, Inc.

  7. Az észt névtervezés az észt nyelvpolitikai modell tükrében [The name management in the mirror of the Estonian LPP-model

    OpenAIRE

    Pomozi, Péter; Földesi, Eszter

    2016-01-01

    The Estonian model of language planning and policy, which has been serving the development and protection of the Estonian language in its current form since 2004, is one of the most successful of such strategies in Europe. It owes it success to the broad social and scientific consensus reached in questions of language policy, regardless of changes in government. The Development Plan of the Estonian Language divides Estonian language planning and policy into three parts: status planning, corpu...

  8. Is the russo-phone minority a structural security threat to the Estonian state? / Maibritt Lind

    Index Scriptorium Estoniae

    Lind, Maibritt

    2003-01-01

    Autor analüüsib vene vähemuse olukorda Eestis, nende poliitilist ja sotsiaalset kaasatust ühiskondlikku ellu, Eesti integratsioonipoliitikat ning kirjeldab venelaste kõrvaletõrjutusega kaasnevaid võimalikke julgeolekupoliitilisi ning Eesti poliitilist stabiilsust mõjutavaid ohte

  9. Formal Safety versus Real Safety: Quantitative and Qualitative Approaches to Safety Culture – Evidence from Estonia

    Directory of Open Access Journals (Sweden)

    Järvis Marina

    2016-10-01

    Full Text Available This paper examines differences between formal safety and real safety in Estonian small and medium-sized enterprises. The results reveal key issues in safety culture assessment. Statistical analysis of safety culture questionnaires showed many organisations with an outstanding safety culture and positive safety attitudes. However, qualitative data indicated some important safety weaknesses and aspects that should be included in the process of evaluation of safety culture in organisations.

  10. The Role of Language in (Recreating Tatar Diaspora Identity: The Case of the Estonian Tatars

    Directory of Open Access Journals (Sweden)

    Maarja Klaas

    2015-06-01

    Full Text Available This paper focuses on the meanings assigned to Tatar language among the Tatar diaspora in Estonia. According to interviews with Estonian Tatars as well as descriptions of field material from Tatarstan, language is an important aspect of Tatar ethnic identity. This paper will track common discourses about the Tatar language and the way it is connected to Tatar ethnic identity. Issues concerning Tatar language are used to demonstrate various ways of enacting Tatarness in Estonia. It is shown that Estonian Tatars worry about the vitality and purity of Tatar language, but for some, marginalization of dialects is also an issue. People categorized with the same identity labels by self and others can experience and enact their Tatarness in a variety of different ways.

  11. Strategies for Estonian rural family enterprises. Eesti maapiirkonna pereettevõtete strateegia

    Directory of Open Access Journals (Sweden)

    Maret Kirsipuu

    2013-01-01

    Full Text Available The paper seeks to analyse family businesses in rural areas, family business strategies and re-registration of sole proprietors with the Centre of Registers and Information Systems (hereinafter Commercial Register in 2009, and to provide an overview of entrepreneurship policies targeted at Estonian rural businesses. Layoffs have increased the number of unemployed; some of those who have lost employment opt for social assistance benefits, but some others decide to become entrepreneurs. Many enterprising people in Estonia have set up a family enterprise, mainly in the sphere of services, agriculture and tourism. The Estonian entrepreneurship policy supports enterprising people and approves of entrepreneurship as a promoter of national economic development. One of the most positive qualities of family enterprises is their short decision-making chain, which ensures rapid implementation of the strategy.

  12. Eesti Rahva Muuseumi strateegiad ja praktikad rahvaga suhtlemisel muuseumi algusaastatel / Estonian National Museum: Public communication strategies and practices in the initial years

    Directory of Open Access Journals (Sweden)

    Piret Õunapuu

    2012-01-01

    Full Text Available Until recently the museum phenomenon as the valuator of the indigenous culture in the context of the awakening national consciousness has received little attention. The evolution of the idea of the Estonian National Museum (ENM and its realization reflects the story of the Estonian people maturing into a nation. The museum was founded by a few dedicated persons and it took a long time before the general public recognised it as the museum for the Estonian people. The main purpose of this research is to ascertain how relations developed between the public and the museum in its initial years and what were the museum strategies in declaring its objectives. After the official foundation of the ENM in 1909 the museum narrative can be divided into two main parts. First, work inside the museum, the compilation and arrangement of collections. This was, above all, the work of the collection committee and organizing heritage collection trips. Collections constitute the basis of a museum – therefore the primary and most important task of the established museum was the collection of heritage items. The collections were started immediately after the foundation of the museum; within the first ten years approximately 20,000 items were collected, approximately two thirds of the items in the years 1911–1913. The phenomenon that a museum where people worked mainly without a salary for the benefit of their homeland, with the set aim to empty the whole of Estonia of heritage items parish by parish and succeeded in engaging dozens and dozens of people for this work, is probably exceptional in world history. As a result, the museum acquired not only voluminous but also valuable item collections, which reached the museum before the devastating First World War. The timing was favourable. There were enough old artefacts left, although most collectors complained in their diaries that there was nothing interesting to be found any more. However, the majority of the

  13. Students and Taxes: a Privacy-Preserving Study Using Secure Computation

    Directory of Open Access Journals (Sweden)

    Bogdanov Dan

    2016-07-01

    Full Text Available We describe the use of secure multi-party computation for performing a large-scale privacy-preserving statistical study on real government data. In 2015, statisticians from the Estonian Center of Applied Research (CentAR conducted a big data study to look for correlations between working during university studies and failing to graduate in time. The study was conducted by linking the database of individual tax payments from the Estonian Tax and Customs Board and the database of higher education events from the Ministry of Education and Research. Data collection, preparation and analysis were conducted using the Share-mind secure multi-party computation system that provided end-to-end cryptographic protection to the analysis. Using ten million tax records and half a million education records in the analysis, this is the largest cryptographically private statistical study ever conducted on real data.

  14. Short outlines of books by Estonian authors : [annotations] / Rutt Hinrikus, Janika Kronberg

    Index Scriptorium Estoniae

    Hinrikus, Rutt, 1946-

    1998-01-01

    Laretei, Käbi. Eksiil; Toona, Elin. Lotukata; Park, Eeva. Naeru õpilane; Luik, Viivi. Inimese kapike; Laaman, Ilona. Vesi ahjus; Viiding, Juhan (Üdi, Jüri). Kogutud luuletused; Paju, Juhan. Katkenud romaan; Paju, Juhan. Hõõguv rist; Estonian short stories / toim. Kajar Pruul ja Darlene Reddaway; Traat, Mats. Kartaago kiirrong; Kauksi Ülle. Säng; Kross, Jaan. Paigallend; Puhvel, Madli. Symbol of dawn; Kaplinski, Jaan. Võimaluste võimalikkus; Kaplinski, Jaan. Usk on uskmatus

  15. The Challenges Organic Food Processors Meet at Small Emerging Market – Estonian Case

    OpenAIRE

    Sarapuu, Kerttu; Pehme, Sirli; Peetsmann, Elen; Matt, Darja

    2014-01-01

    Organic farming and demand for organic products is continually a growing trend all over the world (Willer et al., 2013). In Estonia the share of organic land is 15% of all agricultural land and the number of organic farmers is also growing (Vetemaa, Mikk 2013). Estonian organic food market is still in forming stage being affected by local organic farming development, marketing situation, economic situation and consumer attitudes. Organic processing has clearly not kept up with organic farming...

  16. Assessment of the Estonian Research Development Technology and Innovation Funding System

    OpenAIRE

    Nedeva, Maria; Georghiou, Luke

    2003-01-01

    The objectives of the assessment of the RDTI funding system in Estonia as specified by the Terms of Reference are as follows: 1) to conduct a review of the current R&D funding system in Estonia; 2) to review the objectives of the Estonian R&D Strategy 2002-2006; 3) to review best practice in R&D funding elsewhere; and 4) to propose an efficient, transparent and accountable R&D funding system.

  17. Is Estonian oil shale beneficial in the future?

    International Nuclear Information System (INIS)

    Reinsalu, Enno

    1998-01-01

    Oil shale mining production reached its maximum level of 31.35·10 6 tonnes per year in 1980. After the eighties there was a steady decline in mining. The first scientific prognoses of the inescapable decrease in oil shale mining were published in 1988. According to this, the Estonian oil shale industry would vanish in the third decade of the next century. From the beginning of the nineties, the consumption and export of electricity have dropped in Estonia. The minimum level of oil shale mining was 13.5·10 6 tonnes per year. This occurred in 1994/1995. Some increase in consumption of electric power and oil shale began at the end of 1995. Oil shale processing began to increase gradually in 1993. Oil shale is the most important fuel in Estonia today. In 1997, oil shale provided 76% of Estonia's primary energy supply and accounted for 57% of its economic value. Oil shale is the cheapest fuel in Estonia. Nowadays, oil shale provides an essential part of the fuel supply in Estonia because it is considerably cheaper than other fuels. Oil shale costs EEK 12.16 per G J. At the same time, coal costs EEK 23.41 per G J and peat costs EEK 14.80 per G J (year 1997). There are three important customers of oil shale: the electric power company Eesti Energia, the oil processing company Kiviter and the factory Kunda Nordic Cement. In 1995, the power company utilised 81% of the oil shale mass and 77% of its heating value. The state energy policy inhibits increases in the oil shale price even though the mining infrastructure is decaying. Government price policies subside oil shale processing. The energy of oil shale processing is 1.9 times cheaper than the heating value of raw oil shale for power stations. It could be considered as a state subsidisation of oil and cement export at the expense of electricity. The subsidy assigned to oil processing was of EEK 124·10 6 and to the cement industry of EEK 8.4·10 6 in year 1997 (based on heating value). State regulation of prices and

  18. HIV testing and counselling in Estonian prisons, 2012 to 2013: aims, processes and impacts.

    Science.gov (United States)

    Kivimets, K; Uuskula, A

    2014-11-27

    We present data from an observational cohort study on human immunodeficiency virus (HIV) prevention and control measures in prisons in Estonia to assess the potential for HIV transmission in this setting. HIV testing and retesting data from the Estonian prison health department were used to estimate HIV prevalence and incidence in prison. Since 2002, voluntary HIV counselling and testing has routinely been offered to all prisoners and has been part of the new prisoners health check. At the end of 2012, there were 3,289 prisoners in Estonia, including 170 women: 28.5% were drug users and 15.6% were infected with HIV. Of the HIV-positive inmates, 8.3% were newly diagnosed on prison entry. In 2012, 4,387 HIV tests (including retests) were performed in Estonian prisons. Among 1,756 initially HIV-negative prisoners who were in prison for more than one year and therefore tested for HIV twice within 12 months (at entry and annual testing), one new HIV infection was detected, an incidence of 0.067 per 100 person-years (95% confidence interval (CI): 0.025–5.572). This analysis indicates low risk of HIV transmission in Estonian prisons. Implementation of HIV management interventions could impact positively on the health of prisoners and the communities to which they return.

  19. Estonian folk traditional experiences on natural anticancer remedies: from past to the future.

    Science.gov (United States)

    Sak, Katrin; Jürisoo, Kadi; Raal, Ain

    2014-07-01

    Despite diagnostic and therapeutic advancements, the burden of cancer is still increasing worldwide. Toxicity of current chemotherapeutics to normal cells and their resistance to tumor cells highlights the urgent need for new drugs with minimal adverse side effects. The use of natural anticancer agents has entered into the area of cancer research and increased efforts are being made to isolate bioactive products from medicinal plants. To lead the search for plants with potential cytotoxic activity, ethnopharmacological knowledge can give a great contribution. Therefore, the attention of this review is devoted to the natural remedies traditionally used for the cancer treatment by Estonian people over a period of almost 150 years. Two massive databases, the first one stored in the Estonian Folklore Archives and the second one in the electronic database HERBA ( http://herba.folklore.ee/ ), containing altogether more than 30 000 ethnomedicinal texts were systematically reviewed to compile data about the Estonian folk traditional experiences on natural anticancer remedies. As a result, 44 different plants with potential anticancer properties were elicited, 5 of which [Angelica sylvestris L. (Apiaceae), Anthemis tinctoria L. (Asteraceae), Pinus sylvestris L. (Pinaceae), Sorbus aucuparia L. (Rosaceae), and Prunus padus L. (Rosaceae)] have not been previously described with respect to their tumoricidal activities in the scientific literature, suggesting thus the potential herbal materials for further investigations of natural anticancer compounds.

  20. Comparison of knowledge, attitudes and behaviour regarding smoking among Estonian and Finnish physicians.

    Science.gov (United States)

    Pärna, Kersti; Rahu, Kaja; Barengo, Noël C; Rahu, Mati; Sandström, Patrick H; Jormanainen, Vesa J; Myllykangas, Markku T

    2005-01-01

    To compare smoking behaviour, attitudes and opinions towards smoking and smoking cessation among Estonian and Finnish physicians. A cross-sectional postal survey using a self-administered questionnaire was carried out among 2,480 Estonian and 2,075 Finnish physicians. Daily smoking prevalence was higher among Estonian physicians than among their Finnish counterparts in both male (18.6% and 6.7%) and female (6.6% and 3.6%). Compared to Estonia, physicians in Finland more often agreed that smoking is very harmful to their health, that trying to convince people to stop smoking is their responsibility and that smoking prevention should be part of the normal and special training of health professionals. In both countries, non-smoking physicians held more unfavourable attitudes towards smoking than those who were smoking. Physicians' own smoking patterns and quitting behaviour are important because physicians serve as models for their patients and play a key role in the reinforcement of smoke-free health facilities. These results remain a challenge to medical educators, especially in Estonia. Estonia needs to improve medical education in terms of motivating physicians to ask about the smoking patterns of their patients and of training medical students and resident physicians to counsel their patients to stop smoking.

  1. Cancer incidence and thyroid disease among Estonian Chernobyl clean-up workers

    Energy Technology Data Exchange (ETDEWEB)

    Auvinen, A; Salomaa, S [eds.; Radiation and Nuclear Safety Authority, Helsinki (Finland); Rahu, M; Veidebaum, T; Tekkel, M [eds.; Inst. of Experimental and Clinical Medicine, Tallinn (Estonia); Hakulinen, T [ed.; Finnish Cancer Registry, Helsinki (Finland); Boice, Jr, J D [ed.; Int. Epidemiology Inst., MD (United States)

    1998-09-01

    The report describes the development and summarizes the results of the project Cancer incidence and thyroid disease among Estonian Chernobyl clean-up workers. One of the goals of the report is to give research protocols and questionnaires for researchers involved in other studies. Eight previously published articles are also included summarizing the results. The development of the collaboration work of the project is described in the introduction of the report. Epidemiological methods are described in an article complemented by the protocol and English version of the questionnaire administered to all cleanup workers, as well as the data collection form of the thyroid study. The results from biological biodosimetry using both glycophorin A and FISH methods have shown that the radiation doses received by the Chernobyl cleanup workers were relatively low. Thyroid nodularity was not associated with any radiation exposure characteristic in the thyroid screening study. Estonian Chernobyl cleanup workers were followed up for cancer incidence through the Estonian Cancer Registry. No cases of leukemia or thyroid cancer were observed by the end of 1993. It is too early to observe possible effect on other types of cancer. However, mortality from suicides was increased compared with general population. Further follow-up and the extension to other Baltic countries in the future will undoubtedly strengthen the study. There are also plans for future projects covering areas from psychosocial factors to radiation biology

  2. Links between Adolescents' Relationships with Peers, Parents, and Their Values in Three Cultural Contexts

    Science.gov (United States)

    Tamm, Anni; Kasearu, Kairi; Tulviste, Tiia; Trommsdorff, Gisela

    2018-01-01

    The study examined associations among adolescents' perceived mother-child and father-child relationship quality (intimacy, conflict, and admiration), perceived peer acceptance, and their values (individualism and collectivism) in a sample of 795 Estonian, German, and Russian 15-year-olds. Adolescents from the three cultural contexts differed in…

  3. Field trial on glucose-induced insulin and metabolite responses in Estonian Holstein and Estonian Red dairy cows in two herds

    Directory of Open Access Journals (Sweden)

    Kaart Tanel

    2010-01-01

    Full Text Available Abstract Background Insulin secretion and tissue sensitivity to insulin is considered to be one of the factors controlling lipid metabolism post partum. The objective of this study was to compare glucose-induced blood insulin and metabolite responses in Estonian Holstein (EH, n = 14 and Estonian Red (ER, n = 14 cows. Methods The study was carried out using the glucose tolerance test (GTT performed at 31 ± 1.9 days post partum during negative energy balance. Blood samples were obtained at -15, -5, 5, 10, 20, 30, 40, 50 and 60 min relative to infusion of 0.15 g/kg BW glucose and analysed for glucose, insulin, triglycerides (TG, non-esterified fatty acids (NEFA, cholesterol and β-hydroxybutyrate (BHB. Applying the MIXED Procedure with the SAS System the basal concentration of cholesterol, and basal concentration and concentrations at post-infusion time points for other metabolites, area under the curve (AUC for glucose and insulin, clearance rate (CR for glucose, and maximum increase from basal concentration for glucose and insulin were compared between breeds. Results There was a breed effect on blood NEFA (P P P P P P th min nadir (P th min postinfusion (P Conclusion Our results imply that glucose-induced changes in insulin concentration and metabolite responses to insulin differ between EH and ER dairy cows.

  4. Security at the Expense of Liberty: A Test of Predictions Deriving from the Culture of Control Thesis

    Science.gov (United States)

    Pickett, Justin T.; Mears, Daniel P.; Stewart, Eric A.; Gertz, Marc

    2013-01-01

    In "The Culture of Control: Crime and Social Order in Contemporary Society," David Garland linked contemporary crime control policies and welfare reforms to a cultural formation that he termed the "crime complex of late modernity." According to Garland, once established, the crime complex exerts a contemporaneous effect on…

  5. Family Factors and NEET Status: An Estonian Case Study

    Science.gov (United States)

    Leino, Mare; Hintsanen, Mirka; Hintsa, Taina; Merjonen, Paivi; Keltikangas-Jarvinen, Liisa

    2013-01-01

    For young people, not being in education, employment or training (NEET) may be detrimental to self-esteem and limit possibilities for achieving financial security and a respectable position in society. One major educational problem in Estonia is low academic achievement at the upper level of basic education (Grades 7-9), reflected in a large…

  6. The role of secure attachment, empathic self-efficacy, and stress perception in causal beliefs related to mental illness – a cross-cultural study: Italy versus Israel

    Directory of Open Access Journals (Sweden)

    Mannarini S

    2017-10-01

    Full Text Available Stefania Mannarini,1 Alisa Reikher,1 Sharon Shani,1 Inbal Shani-Zinovich2 1Department of Philosophy, Sociology, Education and Applied Psychology, Interdepartmental Center for Family Research, University of Padova, Padova, Italy; 2Department of Counseling and Human Development, Faculty of Education, University of Haifa, Mount Carmel, Haifa, Israel Background: Research suggests that “mental illness etiological beliefs” and attitudes toward mentally ill people are significantly related; it has also been demonstrated that adult attachment style and empathic self-efficacy affect such attitudes. Moreover, community or regional culture has a significant impact on etiology beliefs and attitudes toward the mentally sick. Materials and methods: We carried out this study in Italy and Israel among psychology students to compare two cultures in regards to causal beliefs of mental disorders and the roles that specific variables, such as secure attachment, empathic self-efficacy, and stress, play in etiological beliefs. The participants (N=305 were students who belonged to two universities: Padua (N=183 and Haifa (N=122. The Many Facet Rasch Model (MFRM was applied in a cross-cultural perspective to analyze the differential functioning of specific etiological beliefs in relation to the above mentioned variables; the effect of gender and religious beliefs was also entered in the MFRM. Results: The two cultures reacted differently to the biogenetic and psychosocial causal explanations of mental disorders: Israeli students endorsed the biogenetic causal beliefs model more frequently than the Italians. Among other findings, concerning the biogenetic model, the Italian students were predominantly males, who declared to be religious and reported lower levels of secure attachment than Israelis. On the other hand, the Israeli students who manifested a preference toward the biogenetic explanation were mostly females, who declared not to be religious and who

  7. Securing the Future of Cultural Heritage by Identifying Barriers to and Strategizing Solutions for Preservation under Changing Climate Conditions

    Directory of Open Access Journals (Sweden)

    Sandra Fatorić

    2017-11-01

    Full Text Available Climate change challenges cultural heritage management and preservation. Understanding the barriers that can impede preservation is of paramount importance, as is developing solutions that facilitate the planning and management of vulnerable cultural resources. Using online survey research, we elicited the opinions of diverse experts across southeastern United States, a region with cultural resources that are particularly vulnerable to flooding and erosion from storms and sea level rise. We asked experts to identify the greatest challenges facing cultural heritage policy and practice from coastal climate change threats, and to identify strategies and information needs to overcome those challenges. Using content analysis, we identified institutional, technical and financial barriers and needs. Findings revealed that the most salient barriers included the lack of processes and preservation guidelines for planning and implementing climate adaptation actions, as well as inadequate funding and limited knowledge about the intersection of climate change and cultural heritage. Experts perceived that principal needs to overcome identified barriers included increased research on climate adaptation strategies and impacts to cultural heritage characteristics from adaptation, as well as collaboration among diverse multi-level actors. This study can be used to set cultural heritage policy and research agendas at local, state, regional and national scales.

  8. DIGITAL PRESERVATION OF PRINTED CULTURAL HERITAGE IN ESTONIA. STRATEGY. METHODOLOGY. PRACTICE

    Directory of Open Access Journals (Sweden)

    Reimo, Tiiu

    2006-12-01

    Full Text Available Preservation of national cultural heritage has been during the last years actively discussed both on institutional and state levels. In October 2003 the working group on digital preservation by theMinistry of Culture elaborated preservation guidelines Strategy of digital preservation of Estonian cultural heritage for years 2004–2007. The strategy is based on the principles of eEurope 2002Action Plan (2000 and Lund Principles (2001.The state strategy is aimed to achieve collaboration of different memory institutions in order to elaborate an unified view on cultural heritage and its digitisation as well as to preservation of digitally created cultural heritage. It is also important to guarantee preservation of cultural heritage and to make it accessible to the public use through the contemporary possibilities of informationand communication technologies. Digitisation and preservation of digitized heritage will be coordinated by the state. The main coordinators are the Ministry of Culture, The Ministry of Educationand Science, the State Chancellery and the National Archive.The methodology of decision making for digital preservation is based on the principles of the UNESCO programme Memory of the World. The choice of objects for digitisation is based on need and expediency that can be evaluated on the ground of acultural value of an object, conservation risks, physical condition of an object and necessity of use.In 2004–2005 metadata requirements for digital preservation were elaborated. The guidelines foresee that digitized objects will be described by four categories of metadata: administrative andtechnical metadata, metadata on access inhibitors and restrictions of use and descriptive metadata. Estonian documentary heritage is located today in different memory institutions: in state or public institutions like archives, libraries and museums, in private possession, in religious and scientific institutions and in possession of the third sector

  9. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  10. Spatial patterns of soil organic carbon stocks in Estonian arable soils

    Science.gov (United States)

    Suuster, Elsa; Astover, Alar; Kõlli, Raimo; Roostalu, Hugo; Reintam, Endla; Penu, Priit

    2010-05-01

    Soil organic carbon (SOC) determines ecosystem functions, influencing soil fertility, soil physical, chemical and biological properties and crop productivity. Therefore the spatial pattern of SOC stocks and its appropriate management is important at various scales. Due to climate change and the contribution of carbon store in the soils, the national estimates of soil carbon stocks should be determined. Estonian soils have been well studied and mapped at a scale 1:10,000. Previous studies have estimated SOC stocks based on combinations of large groups of Estonian soils and the mean values of the soil profile database, but were not embedded into the geo-referenced databases. These studies have estimated SOC stocks of Estonian arable soils 122.3 Tg. Despite of available soil maps and databases, this information is still very poorly used for spatial soil modelling. The aim of current study is to assess and model spatial pattern of SOC stocks of arable soils on a pilot area Tartu County (area 3089 sq km). Estonian digital soil map and soil monitoring databases are providing a good opportunity to assess SOC stocks at various scales. The qualitative nature of the initial data from a soil map prohibits any straightforward use in modelling. Thus we have used several databases to construct models and linkages between soil properties that can be integrated into soil map. First step was to reorganize the soil map database (44,046 mapping units) so it can be used as an input to modelling. Arable areas were distinguished by a field layer of Agricultural Registers and Information Board, which provides precise information of current land use as it is the basis of paying CAP subsidies. The estimates of SOC content were found by using the arable land evaluation database of Tartu from the Estonian Land Board (comprising 950 sq km and 31,226 fields), where each soil type was assessed separately and average SOC content grouped by texture was derived. SOC content of epipedon varies in

  11. Trends in smoking behaviour among Estonian physicians in 1982-2014.

    Science.gov (United States)

    Pärna, Kersti; Põld, Mariliis; Ringmets, Inge

    2017-07-25

    Smoking surveys among physicians have proved useful in highlighting the importance of physicians as healthy life style exemplars and role models in tobacco control and smoking cessation. The aim of this study was to give an overview of smoking behaviour among Estonian physicians from 1982 to 2014. Three cross-sectional postal surveys using a self-administered questionnaire were carried out among all practising physicians in Estonia. The number of physicians participating in this study was 3786 in 1982, 2735 in 2002, and 2902 in 2014. Data analysis involved calculating the age-standardized prevalences of smoking, prevalences of smoking by age group and mean age of smoking initiation. A non-parametric test for trend was used to assess significant changes in smoking over time. Age-standardized prevalence of current smoking among men was 39.7% in 1982, 20.9% in 2002, and 14.3% in 2014 and among women 12.2%, 8.0%, and 5.2%, respectively (p smoking among men and women was in age groups under 35 (from 55.2% to 16.7% and from 16.7% to 2.8%, respectively) and 35-44 (from 47.1% to 8.3% and from 19.5% to 5.1%, respectively) (p smoking initiation decreased from 20.4 to 19.3 among men and from 24.5 to 20.4 among women over the study period. In 1982-2014, smoking prevalence among Estonian physicians declined substantially. This may influence the willingness of society to recognize the health consequences of smoking which could give a support to the decline of the smoking epidemic in the country. Differences between smoking among male and female physicians persisted over the study period, but mean age of smoking initiation decreased. A further decline in smoking among Estonian physicians should be encouraged by special efforts targeted at physicians.

  12. The treatment of lexical collocations in EFL coursebooks in the Estonian secondary school context

    Directory of Open Access Journals (Sweden)

    Liina Vassiljev

    2015-04-01

    Full Text Available The article investigates lexical collocations encountered in English as a Foreign Language (EFL instruction in Estonian upper secondary schools. This is achieved through a statistical analysis of collocations featuring in three coursebooks where the collocations found are analysed in terms of their type, frequency and usefulness index by studying them through an online language corpus (Collins Wordbanks Online. The coursebooks are systematically compared and contrasted relying upon the data gathered. The results of the study reveal that the frequency and range of lexical collocations in a language corpus have not been regarded as an essential criterion for their selection and practice by any of the coursebook authors under discussion.

  13. Estonian experience in establishing the national radiation protection infrastructure in the newly independent State

    International Nuclear Information System (INIS)

    Kalam, J.

    2001-01-01

    The Estonian Radiation Protection Centre (ERPC) was established on 4 January 1996 as the regulatory authority for radiation protection and safety of radiation sources. The report explains the ERPC's structure and its main functions and activities, and provides information on the regulations that have been approved or are planned to be adopted. Reference is made to radiological emergency preparedness and, in particular, to the status of development of the system of regulatory control by authorization and inspection of radiation practices in the country. (author)

  14. cultural

    Directory of Open Access Journals (Sweden)

    Irene Kreutz

    2006-01-01

    Full Text Available Es un estudio cualitativo que adoptó como referencial teorico-motodológico la antropología y la etnografía. Presenta las experiencias vivenciadas por mujeres de una comunidad en el proceso salud-enfermedad, con el objetivo de comprender los determinantes sócio-culturales e históricos de las prácticas de prevención y tratamiento adoptados por el grupo cultural por medio de la entrevista semi-estructurada. Los temas que emergieron fueron: la relación entre la alimentación y lo proceso salud-enfermedad, las relaciones con el sistema de salud oficial y el proceso salud-enfermedad y lo sobrenatural. Los dados revelaron que los moradores de la comunidad investigada tienen un modo particular de explicar sus procedimientos terapéuticos. Consideramos que es papel de los profesionales de la salud en sus prácticas, la adopción de abordajes o enfoques que consideren al individuo en su dimensión sócio-cultural e histórica, considerando la enorme diversidad cultural en nuestro país.

  15. Exploring Constructivist Social Learning Practices in Aiding Russian-Speaking Teachers to Learn Estonian: An Action Research Approach

    Science.gov (United States)

    Kiilo, Tatjana; Kutsar, Dagmar

    2012-01-01

    Based on appreciative inquiry and threshold concepts from an intercultural learning perspective, the article makes insights into the constructivist social learning practice of Estonian language learning amongst Russian-speaking teachers in Estonia. The application of educational action research methodology, more specifically that of Bridget…

  16. Proficiency Assessment of Male Volleyball Teams of the 13-15-Year Age Group at Estonian Championships

    Science.gov (United States)

    Stamm, Meelis; Stamm, Raini; Koskel, Sade

    2008-01-01

    Study aim: Assessment of feasibility of using own computer software "Game" at competitions. Material and methods: The data were collected during Estonian championships in 2006 for male volleyball teams of the 13-15-years age group (n = 8). In all games, the performance of both teams was recorded in parallel with two computers. A total of…

  17. Tabud ja reeglid. Sissevaateid eesti laagriromaani / Taboos and Rules. Insights into Prison Camp Novels by Estonian Writers

    Directory of Open Access Journals (Sweden)

    Anneli Kõvamees

    2013-12-01

    Full Text Available The article concentrates on Estonian novels depicting Soviet prison camps in the 1940s and 1950s. The goal is to map themes, motifs and characteristics in such novels, concentrating on various taboos and rules in the prison camp environment. For a long time the Soviet prison camp theme was not publicly discussed in Estonia due to political reasons. Texts dealing with prison camps could appear in print only outside the Soviet Union; the way Estonians saw these historical events and hellish experiences were depicted mostly in exile novels. Most notable are the novels by Arved Viirlaid (b. 1922, e.g., Kes tappis Eerik Hormi? (Who Killed Eerik Horm? (1974, Surnud ei loe (The Dead do not Read (1975, Vaim ja ahelad (Mind and Chains (1961. Estonian prison camp novels can be seen as “the literature of testimony”, to use the term by Leona Toker. Dramatic historical events are written down to record the events and to show the inhumane nature of Soviet society. These records of the dramatic past follow certain patterns and create certain self- and hetero-images. A prison camp is a closed territory within a closed territory; prison camps can be seen as small models of Soviet society. Prison camp novels give a detailed view of the environment of the prison camp, its inhabitants and activities. Two central aspects are labour and food; the life of the prisoner whirls around these. The most important thing is to survive, which often leads to moral decline, e.g., stealing, cheating. However, there are lines Estonians do not cross, e.g., cannibalism or homosexual relationships with superiors. Estonians are always depicted as political prisoners (not common criminals and heterosexuals, while Russians are portrayed mainly as criminals and often also as homosexuals. Another important component of the image of the Estonians is their enterprising spirit and ability to manage even under very difficult conditions. Therefore, several oppositions can be identified, e

  18. Mental health and alcohol problems among Estonian cleanup workers 24 years after the Chernobyl accident.

    Science.gov (United States)

    Laidra, Kaia; Rahu, Kaja; Tekkel, Mare; Aluoja, Anu; Leinsalu, Mall

    2015-11-01

    To study the long-term mental health consequences of the 1986 Chernobyl nuclear accident among cleanup workers from Estonia. In 2010, 614 Estonian Chernobyl cleanup workers and 706 geographically and age-matched population-based controls completed a mail survey that included self-rated health, the Posttraumatic Stress Disorder Checklist (PCL), alcohol symptoms (AUDIT), and scales measuring depressive, anxiety, agoraphobia, fatigue, insomnia, and somatization symptoms. Respondents were dichotomized into high (top quartile) and low symptom groups on each measure. Logistic regression analysis detected significant differences between cleanup workers and controls on all measures even after adjustment for ethnicity, education, marital status, and employment status. The strongest difference was found for somatization, with cleanup workers being three times more likely than controls to score in the top quartile (OR = 3.28, 95% CI 2.39-4.52), whereas for alcohol problems the difference was half as large (OR = 1.52, 95% CI 1.16-1.99). Among cleanup workers, arrival at Chernobyl in 1986 (vs. later) was associated with sleep problems, somatization, and symptoms of agoraphobia. The toll of cleanup work was evident 24 years after the Chernobyl accident among Estonian cleanup workers indicating the need for focused mental health interventions.

  19. Radon in Estonian buildings. Establishment of a measurement system and obtained results

    International Nuclear Information System (INIS)

    Pahapill, L.; Rulkov, A.; Swedjemark, G.A.

    1996-12-01

    One purpose of this project was the establishment of a radon monitoring programme inside the state environmental monitoring programme. Another purpose was to investigate regions, expected to have high radon levels indoors. A new method for the long-term measurement of indoor radon was established and the staff for these measurements was trained. The results of the measurement can be used by Estonian decision-makers to work out rules and standards. There is no legislative act in the field of radiation in Estonian at this time. To summarize the results of the measurements we can say that indoor radon concentrations vary by region. The radon investigations must be continued to identify the risk areas and types of housing construction. The results of the state radon monitoring are provided to the municipalities, who advice the owners of planned new houses to select the right construction for the house. A new project will follow with an investigation of radon in randomly selected dwellings, training and equipment for radon measurement in soil, and general advice with regard to radon, as well as assistance in preparing information about radon. 7 refs, 5 figs

  20. Võsast võrsub kultuur = Sowing the seeds of Estonian culture / Piret Õunapuu

    Index Scriptorium Estoniae

    Õunapuu, Piret, 1955-

    2014-01-01

    Läbilõige Eesti Rahva Muuseumi ajaloost, uue muuseumihoone ehitamisest Raadile (arhitektuurivõistluse võidutöö nimega "Memory Field", autoriteks rahvusvaheline arhitektide kolmik Pariisist: Dan Dorell, Lina Ghotmeh ja Tsuyoshi Tane) ning selles 2016.a. avatavatest püsinäitustest

  1. Muutuv ruum : meediakunst eesti kultuuris = Changing spaces : new media art in Estonian culture / Katrin Kivimaa

    Index Scriptorium Estoniae

    Kivimaa, Katrin, 1969-

    2004-01-01

    1990-ndate aastate Eesti kaasaegse kunsti arengust, selle medialiseerumisest, mida iseloomustab fotograafia, video ja arvutipõhise meedia tungimisest "kõrgesse kunsti", Mall Nukke, Tiia Johannsoni, Raivo Kelomehe ja Nelli Rohtvee netiprojektidest ning Ando Keskküla kureeritud rahvusvahelistest kunsti- ja meediaüritustest "Interstanding"1-3, ka Prantsuse-Balti videofestivalidest, uue meedia festivalist "Offline@online". Eestikeelne lühem variant ilmunud ajakirjas "Kunst.ee", 2001, nr.4, inglisekeelne - ajakirjas "Mare Articum", 2000, nr. 2(7)?

  2. Identity and Othering in Past and Present: Representations of the Soviet Era in Estonian Post-Soviet Textbooks

    Directory of Open Access Journals (Sweden)

    Katrin Kello

    2018-02-01

    Full Text Available This paper analyses representations of the ‘core Soviet era’ (1945-1985 in Estonian post-Soviet history textbooks (1989-2016. Attitudes towards the Soviet system have been a rich resource for identity building, and hence a powerful political tool across the whole of the post-Soviet block. Based on an analysis of sections about the Soviet era in Estonia in 21 textbooks, the paper takes a look at how textbooks reflect broader processes of social meaning making, identity building and othering after a profound social and political turn. In 1989 and during the early 1990s, perspectives and narratives in Estonian history textbooks were closely related to social memory and national politics, enacting a specific social representation of the Soviet era that dominated the Estonian-speaking public space during the 1990s. The Soviet era, Russia and local Russians became the main Others for Estonia and Estonians. Over time, public discourse has diversified. The national curriculum and textbooks, however, still maintain the canon that formed in 1990s and thus reflect earlier sentiments. Apart from the increasing salience of Soviet-era daily life in more recent textbooks, the thematic choices and emphases have changed little since the 1990s. Therefore, even if the style of writing has ‘cooled down’, issues of identity preservation, resistance and accommodation, together with a saliently negative representation of wrongdoings by the Soviet system, still prevail. On the one hand, this testifies to the resilience of an established tradition in the textbook genre in general. On the other hand, it reflects the dominance of an ethnocentric tradition in Estonian history textbook writing. The paper discusses the implications of these findings for interethnic relations in Estonia.

  3. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  4. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  5. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  6. The role of gender, values, and culture in adolescent bystanders' strategies.

    Science.gov (United States)

    Tamm, Anni; Tulviste, Tiia

    2015-02-01

    We examined the relationship between adolescent bystanders' strategies for intervening in the bullying-like situation and their gender, values, and cultural origin. The sample consisted of 682 Estonian and Russian-Estonian adolescents (M age = 13.02 years). They were shown a video of a bullying-like situation with a non-intervening adult bystander and asked to describe what they would do if they, instead of the adult, witnessed that situation. Only 10% said that they would not intervene. Girls were more likely than boys to suggest multiple actions. Adolescents who valued conformity were less likely to propose using physical aggression. Doing nothing was less likely suggested by those who placed more importance on conformity and less on power. Estonian adolescents were more likely than their Russian-Estonian peers to suggest finding out what is going on, and less likely to say that they would do nothing. The findings suggest that although most adolescents express willingness to help the victim, they might not actually know how to intervene. © The Author(s) 2014.

  7. Re-conceptualizing mother tongue tuition of Estonian abroad as a transnational phenomenon

    Directory of Open Access Journals (Sweden)

    Maarja Siiner

    2017-05-01

    Full Text Available The governmental initiative called the Compatriots Programme, which supports language tuition in Estonian schools and societies abroad, reveals an increased interest in developing intergenerational language transmission in the growing Estonian diaspora. This transnational language political activity signals a new era in language policy, where nation states are increasingly decentralized by migration. The evaluation of the program furthermore reveals that organizing such schools requires a willingness to take language political agency, typically conducted by well-educated and well-integrated resourceful transnational multilingual parents. The present article outlines the results of an ethnographic study of the process of establishing the Estonian School in Copenhagen. This step has demanded a change in the mindset still prevailing in Estonia that language political activities, such as planning language acquisition, are solely the responsibility of the state. Since the prevailing language ideology in Denmark is not favorable towards multilingualism in migrant languages, intergenerational language transmission furthermore presupposes a feeling of ownership of the language and high language self-esteem. "Hargmaise keelepoliitika sünd. Eesti keeleõppe korraldamise võimalikkusest välismaal Taani näitel" Hargmaisus, kasvav väljarändajate arv ja sellega ka eesti keele rääkijate hulk välismaal on jätnud oma jälje eesti keelepoliitikale. Kui varem uuriti peamiselt seda, kuidas eesti keel muukeelses kontekstis muutub, siis viimasel kümnendil on riik asunud aktiivselt toetama eesti keele jätkuvat kasutamist välismaal, rahastades rahvuskaaslaste programmi abil haridusprogramme. Kuid millised faktorid määravad selle, kas uus eestlaste põlvkond oskab ja tahab eesti keelt rääkida? Artikkel hindab etnograafilises ja sotsiolingvistilises võtmes Kopenhaagenis kolm aastat tegutsenud Eesti Kooli ja Lasteklubi näitel, millised on keelekasutust

  8. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  9. A Cultural Resources Inventory and Historical Evaluation of the Smoky Atmospheric Nuclear Test, Areas 8, 9, and 10, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Robert C. [Desert Research Inst. (DRI), Reno, NV (United States); King, Maureen L. [Desert Research Inst. (DRI), Reno, NV (United States); Beck, Colleen M. [Desert Research Inst. (DRI), Reno, NV (United States); Falvey, Lauren W. [Desert Research Inst. (DRI), Reno, NV (United States); Menocal, Tatianna M. [Desert Research Inst. (DRI), Reno, NV (United States)

    2014-09-01

    This report presents the results of a National Historic Preservation Act Section 106 cultural resources inventory and historical evaluation of the 1957 Smoky atmospheric test location on the Nevada National Security Site (NNSS). The Desert Research Institute (DRI) was tasked to conduct a cultural resources study of the Smoky test area as a result of a proposed undertaking by the Department of Energy Environmental Management. This undertaking involves investigating Corrective Action Unit (CAU) 550 for potential contaminants of concern as delineated in a Corrective Action Investigation Plan. CAU 550 is an area that spatially overlaps portions of the Smoky test location. Smoky, T-2c, was a 44 kt atmospheric nuclear test detonated at 5:30 am on August 31, 1957, on top of a 213.4 m (700 ft) 200 ton tower (T-2c) in Area 8 of the NNSS. Smoky was a weapons related test of the Plumbbob series (number 19) and part of the Department of Defense Exercise Desert Rock VII and VIII. The cultural resources effort involved the development of a historic context based on archival documents and engineering records, the inventory of the cultural resources in the Smoky test area and an associated military trench location in Areas 9 and 10, and an evaluation of the National Register eligibility of the cultural resources. The inventory of the Smoky test area resulted in the identification of structures, features, and artifacts related to the physical development of the test location and the post-test remains. The Smoky test area was designated historic district D104 and coincides with a historic archaeological site recorded as 26NY14794 and the military trenches designed for troop observation, site 26NY14795. Sites 26NY14794 and 26NY14795 are spatially discrete with the trenches located 4.3 km (2.7 mi) southeast of the Smoky ground zero. As a result, historic district D104 is discontiguous and in total it covers 151.4 hectares (374 acres). The Smoky test location, recorded as historic

  10. Whole-word frequency and inflectional paradigm size facilitate Estonian case-inflected noun processing.

    Science.gov (United States)

    Lõo, Kaidi; Järvikivi, Juhani; Baayen, R Harald

    2018-06-01

    Estonian is a morphologically rich Finno-Ugric language with nominal paradigms that have at least 28 different inflected forms but sometimes more than 40. For languages with rich inflection, it has been argued that whole-word frequency, as a diagnostic of whole-word representations, should not be predictive for lexical processing. We report a lexical decision experiment, showing that response latencies decrease both with frequency of the inflected form and its inflectional paradigm size. Inflectional paradigm size was also predictive of semantic categorization, indicating it is a semantic effect, similar to the morphological family size effect. These findings fit well with the evidence for frequency effects of word n-grams in languages with little inflectional morphology, such as English. Apparently, the amount of information on word use in the mental lexicon is substantially larger than was previously thought. Copyright © 2018 Elsevier B.V. All rights reserved.

  11. Determination of Heating Value of Estonian Oil Shale by Laser-Induced Breakdown Spectroscopy

    Directory of Open Access Journals (Sweden)

    M. Aints

    2018-01-01

    Full Text Available The laser-induced breakdown spectroscopy (LIBS combined with multivariate regression analysis of measured data were utilised for determination of the heating value and the chemical composition of pellets made from Estonian oil shale samples with different heating values. The study is the first where the oil shale heating value is determined on the basis of LIBS spectra. The method for selecting the optimal number of spectral lines for ordinary multivariate least squares regression model is presented. The correlation coefficient between the heating value predicted by the regression model, and that measured by calorimetric bomb, was R2=0.98. The standard deviation of prediction was 0.24 MJ/kg. Concentrations of oil shale components predicted by the regression model were compared with those measured by ordinary methods.

  12. Taxes, Estonian state budget and economic crises. Maksud, riigi eelarve ja majanduskriis

    Directory of Open Access Journals (Sweden)

    Olev Raju

    2013-01-01

    Full Text Available Recession has sharply erected the question of tax burden and the optimal proportion of different kinds of taxes among the incomes of the budget. Indirect taxes and consumption taxes, which proportion is different according to different methodologies, dominate in Estonian state budget. The buoyancy of a tax system based on taxes of that kind is especially weak during the recession. Difficulties concerning the incomes of budget have arisen the necessity for lifting taxes, which is possible as the tax burden is low now. But a sharp question of the optimal level of taxes is going to be raised. A formula for indirect tax optimum according to Ramsey taxes and Slutski decomposition has been proposed in the article.

  13. Comparative analysis of idiom selection and sequencing 5 in Estonian basic school EFL coursebooks

    Directory of Open Access Journals (Sweden)

    Rita Anita Forssten

    2017-05-01

    Full Text Available The article investigates the selection and sequencing of the idioms encountered in two locally-produced and international coursebook series currently employed in Estonian basic schools. It is hypothesized that there exists a positive correlation between idioms’ difficulty and coursebooks’ language proficiency level. The hypothesis is tested through a statistical analysis of the idioms found which are categorized in terms of their analysability into three categories where category 1 includes analysable semi-literal idioms, category 2 comprises analysable semi-transparent idioms, and category 3 encompasses non-analysable opaque idioms, and then analysed through an online language corpus (British National Corpus. The results of the study reveal that the coursebook authors under discussion have disregarded idioms’ frequency as a criterion for selection or sequencing, whereas the factor utilized to some extent is the degree of analysability.

  14. Conceptual co-presence of motion and emotion in the Estonian terms of personality

    Directory of Open Access Journals (Sweden)

    Heili Orav

    2010-05-01

    Full Text Available The purpose of the study was to find out whether the conceptual connection of emotion and motion is holding in the domain of personality traits. In a quantitative study 40 Estonian terms of personality traits were investigated and a conclusion was driven that, indeed, the qualities of emotionality and motion are perceived as co-present characteristics. In further data analysis some visualized measures were applied in order to get further insights into the hidden structure of the data. The self-organizing map (SOM analysis revealed an additional dimension of axiological evaluations present in the semantics and the SOM meta-analysis technique revealed groups of near synonymous words as well as gave overview of the more general structure common in the two data sets. The latter was tentatively explained by the person’s habitual level of activation.DOI: http://dx.doi.org/10.5128/ERYa6.21

  15. Change in medical plant use in Estonian ethnomedicine: a historical comparison between 1888 and 1994.

    Science.gov (United States)

    Sõukand, Renata; Kalle, Raivo

    2011-05-17

    The aim of this paper is to compare the changes in the utilization of species from various hemeroby categories (indicating the degree of sensitivity of the plant to human impact) using historical data concerning the years 1888-1994. The authors digitised 8808 handwritten reports, reflecting local ethnopharmacological knowledge from 8 selected collections from the Estonian Folklore Archives of the Estonian Literary Museum. They were semi-quantitatively analyzed according to the sensitivity to human impact of 540 taxa that could possibly be related to the plant vernacular names given in the reports. Although in different periods of time the number of ethnopharmacologically used plants has changed, the proportion of plants utilized from each group has remained relatively same, consisting on average of: 23% anthropophytes, 42% apophytes, 32% hemeradiaphores and 3% hemerophobes. Comparison of the application of the most used plants revealed considerable changes of plant utilization, in which the varied use of the most popular anthropophytes increased and the applied scope of the most popular hemeradiaphores and hemerophobes decreased almost by twofold in one century. Case studies on seven taxa are presented, of them, use of Allium sativum L., Aesculus hippocastanum L. and Mentha xpiperita L. increased, whereas the use of Hordeum L., Orchidaceae, Paris quadrifolia L. and Briza media L. decreased greatly. This research contributes to the better understanding of the cognitive and human ecological concepts underlying the use of medicinal plants in Estonia. Strong increase in the ethnomedical utilization of plants depending on human influence, and a decrease in the use of taxa that do not prefer human activities indicates that, despite some of the population still have access to natural resources and diverse knowledge of the medical use of plants, the majority relies on a very narrow selection and a rather restricted herbal landscape. Copyright © 2011 Elsevier Ireland Ltd

  16. Smoking prevalence and attitudes towards smoking among Estonian physicians: results from cross-sectional studies in 2002 and 2014

    OpenAIRE

    Põld, Mariliis; Pärna, Kersti

    2017-01-01

    Objectives To explore smoking prevalence and attitudes towards smoking among Estonian physicians in 2002 and 2014. Design Two self-administered cross-sectional postal surveys were conducted among practising physicians in Estonia. Participants Initial sample consisted of all practising physicians in Estonia. The corrected response rate was 67.8% in 2002 and 53.1% in 2014. Present study sample was restricted to physicians younger than 65 years (n=2549 in 2002, n=2339 in 2014). Methods Age-stand...

  17. Mutational analysis of COL1A1 and COL1A2 genes among Estonian osteogenesis imperfecta patients.

    Science.gov (United States)

    Zhytnik, Lidiia; Maasalu, Katre; Reimann, Ene; Prans, Ele; Kõks, Sulev; Märtson, Aare

    2017-08-15

    Osteogenesis imperfecta (OI) is a rare bone disorder. In 90% of cases, OI is caused by mutations in the COL1A1/2 genes, which code procollagen α1 and α2 chains. The main aim of the current research was to identify the mutational spectrum of COL1A1/2 genes in Estonian patients. The small population size of Estonia provides a unique chance to explore the collagen I mutational profile of 100% of OI families in the country. We performed mutational analysis of peripheral blood gDNA of 30 unrelated Estonian OI patients using Sanger sequencing of COL1A1 and COL1A2 genes, including all intron-exon junctions and 5'UTR and 3'UTR regions, to identify causative OI mutations. We identified COL1A1/2 mutations in 86.67% of patients (26/30). 76.92% of discovered mutations were located in the COL1A1 (n = 20) and 23.08% in the COL1A2 (n = 6) gene. Half of the COL1A1/2 mutations appeared to be novel. The percentage of quantitative COL1A1/2 mutations was 69.23%. Glycine substitution with serine was the most prevalent among missense mutations. All qualitative mutations were situated in the chain domain of pro-α1/2 chains. Our study shows that among the Estonian OI population, the range of collagen I mutations is quite high, which agrees with other described OI cohorts of Northern Europe. The Estonian OI cohort differs due to the high number of quantitative variants and simple missense variants, which are mostly Gly to Ser substitutions and do not extend the chain domain of COL1A1/2 products.

  18. Social Security for Composers and Free Lances.

    Science.gov (United States)

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  19. How to Improve the Supportive Role of Estonian Innovation System toward Launching New Products by High Technology Companies?

    Directory of Open Access Journals (Sweden)

    Liisi Sepp

    2013-01-01

    Full Text Available The purpose of the study is to evaluate how supportive is Estonian national innovation system toward the launching of new innovative products by high technology firms. The article intends to combine two broad areas of research – national innovation system approach and the different models of the new product launching. Based on the literature review and in-depth analysis of three case studies of Estonian high-tech company’s major barriers as well success factors of highly innovative product launches were identified. The barriers of the new product launching were linked with the systemic failures of the national innovation system. The most relevant failures of Estonian national innovation system inhibiting the new product development are capability and networking failures. The sources of innovation of high-technology firms are too narrow, linkages with domestic firms and higher education institutions as well with foreign firms are poorly developed. High-tech firms have also serious capacity problems due to the extremely weak support mechanism by national innovation system on the seed funding stage of product development and prototype building stage as well. Paper argues that resources needed for the innovation should not be looked too narrowly following linear innovation model approach. Instead interactive approach is needed, which combines capability building, network development, interactive learning with direct investments into fundamental research.

  20. Nooreestlased arvustuses ja arvustajatena: lugejakontseptsioonist 20. sajandi alguse kriitikas. The Young Estonians as Critics and in the Eyes of Critics: On the Concept of the Reader in Early 20th Century Estonia

    Directory of Open Access Journals (Sweden)

    Marju Mikkel

    2012-04-01

    Full Text Available Until recently, the treatment of Estonian literature from the beginning of the 20th century has been influenced by the literary and cultural activities and programmatic articles of the Young Estonia movement. Current research on Young Estonia has addressed their more everyday realm of activity, which has heretofore received less attention: the Young Estonians as readers of the new works of their literary contemporaries and their practical criticism in reviews, particularly in daily newspapers. This article uses a receptionhistorical approach to analyze a large body of source material: the Young Estonians voluminous critical oeuvre in the period 1905–1915. The Young Estonians to be examined are all members of the core group of the movement: Gustav Suits, Bernhard Linde, Aino Kallas, Johannes Aavik, Villem Grünthal-Ridala, Jaan Oks, August Alle, and Johannes Semper. Within the larger framework of collective horizons of expectation, the focus of the study is the critics` concept of the reader. In addition, I will briefly discuss the dynamics of how such conceptions change. Research results indicate that in critical reviews from the time of Young Estonia, the topic of the reader was addressed from different standpoints depending on the addressee. Texts directed rhetorically toward a broad readership are characterized by the pursuit of objectivity and generalizations. When the concept of the reader is critic-centered, the text emphasizes subjective judgments, experience, and emotion. When focusing on the author and the text, the reviewer describes the influence on the reader, the cause of which is either the literary work directly or the author’s genius. In the case of polemic on the subject of reading, found mainly in responses written to reviews, the writer interprets another reader (or other readers` reading, opposing it to his or her own. When we follow the way the readers of Young Estonia and the Young Estonians themselves handle the

  1. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  2. Estonian exceptionalism

    Index Scriptorium Estoniae

    2011-01-01

    Ulatuslikud kärped ja liitumine eurotsooniga toovad Eestist häid majandusuudiseid: töötus langeb, majandus kasvab, eksport tõuseb, eelarve on plussis, reitinguagentuur Fitch krediidireiting tõusis tasemele A+

  3. With or without articles? A comparison of article-like determiners in Estonian and Finnish

    Directory of Open Access Journals (Sweden)

    Helen Hint

    2017-10-01

    Full Text Available In this paper, we compare the use and functions of definite and indefinite article-like determiners in Estonian and Finnish. Our main aim is to explore whether the factors that explain the choice of particular determiner forms are similar in Estonian and Finnish. We use a picture-sequence based elicitation experiment to collect spoken narratives from adult native speakers of Estonian and Finnish, and apply non-parametric tree and forest models to analyze the data. Our findings indicate that number of mention and animacy are important predictor variables in both languages, but their exact effect is divergent. We also find that in Finnish, case of the determiner NP proves to be an important factor, while in Estonian, syntactic role of the NP explains some aspects of determiner form choice. Nevertheless, the overall usage frequency of determiners is modest in the Estonian and Finnish data, and the process of grammaticalizing articles is only in initial stages in both languages. *** Artikliga, artiklita? Eesti ja soome keele artiklilaadsete määratlejate võrdlus Siinses uurimuses analüüsime võrdlevalt artiklilaadseid definiitseid ja indefiniitseid määratlejaid eesti ja soome keeles. Eelkõige kõrvutame eesti keele definiitset määratlejat see ja soome keele definiitseid määratlejaid se ja tämä ning eesti ja soome indefiniitset määratlejat üks/yks(i. Samuti vaatleme eesti keele possessiivpronoomeni oma ning soome 3sg possessiivsufiksi (-nsa/-nsä, -Vn referentsiaalseid omadusi. Uurimuse põhieesmärgiks on selgitada, millised on peamised määratlejate kasutust mõjutavad keelelised faktorid eesti ja soome keeles ning kas need faktorid on keeliti sarnased või erinevad. Ühtlasi otsime vastust küsimusele, kas eesti ja soome keeles on põhjust rääkida määratlejate grammatisatsioonist artikliteks. Uuritav keelematerjal pärineb pildiseeria põhjal kogutud suulistest narratiividest. Uurimuses osales 20 eesti ja 20 soome keele

  4. Grupuskulaarne identiteediloome paremäärmuslaste võrgusuhtluses / The Formation of Groupuscular Identity in the Web Communication of the Estonian Extreme Right

    Directory of Open Access Journals (Sweden)

    Mari-Liis Madisson

    2015-06-01

    core Estonianness“ and protect it from foreign influences; the belief that the world order (including Estonian power structures are controlled by a secret alliance between Zionists and Masonic orders; the danger of mixing races and cultures; the need to exert strong state control over a range of areas of life; euroskepticism.  According to the authors of this article non-institutionalized extreme right movements operating in hypermedia have been most extensively examined by Roger Griffin’s research. Griffin has developed the concept of the groupuscule, which can be defined as small, political, (though almost never directly partypolitical unit in the context of contemporary extreme right-wing politics, and which strive toward revolutionary, ideological, organizational, and activist goals, the overall purpose of which is to overcome the decadence of the liberal democratic system.  Groupuscules can have diverse physical manifestations: webpages, magazines, and why not also underground meetings of extreme-right cell groups. Indeed, according to Griffin, groupuscules can be treated as non-nuclear cellular networks without a leader. The communication of groupuscules reflects the characteristics of hypermedia itself: nonhierarchical or network-like structure, internal multiplicity, the lack of a centre or a central axis of organization, fluidity, and temporariness, all of which are most often connected with the abstract textuality of the hypermedia environment.  In our view, the main limitation of Griffin’s account of groupuscules is the undertheorization of communication both within and among groupuscules. Too little attention has been directed to the primary mechanisms of meaning-creation, which organize navigation on the groupuscular information field and the development of hierarchies. In this article we aim to supplement Griffin’s theory of the groupsucule by means of a cultural-semiotic approach, particularly through the concepts of the semiosphere and the code text

  5. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  6. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  7. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  8. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  9. Does the European Union still matter for Estonian's security? Positioning Estonia in CFSP and ESDP / Kristi Raik

    Index Scriptorium Estoniae

    Raik, Kristi

    2003-01-01

    Eesti peab otsustama, kas võtta eesmärgiks kuulumine Euroopa Liidu välis- ja julgeolekupoliitika tuumikusse ja olla valmis süvendama integratsiooni või säilitada praegune ettevaatlik seisukoht, millega kaasneks risk jääda Euroopa julgeolekusüsteemis vähese mõjuvõimuga perifeerseks väikeriigiks

  10. Estonian energy system: Proposals for the implementation of a cogeneration strategy

    International Nuclear Information System (INIS)

    Lund, H.; Hvelplund, F.; Ingermann, K.; Kask, U.

    2000-01-01

    Since the Soviet era Estonia inherited oil-shale-based electricity plants, with a capacity of 3000 MW. Oil shale now provides Estonia with very low electricity prices. However, most of the stations are very old. Half of them were built before 1965, and sooner or later the old oil shale production units will have to be replaced. Estonia will then have to face serious increases in electricity production prices. At the same time Estonia has problems in restoring its district heating systems. The prices are rising and may consumers have converted to other heating sources such as electric heating. The major long-term strategic policy choices to make in Estonia are to decide (1) whether the oil shale power stations should be replaced by new centralized production units such as new oil shale stations or nuclear power, or (2) whether the electricity production should be decentralized. In the centralized solution (oil shale or nuclear power), the domestic heating will be left to boilers or electric heating leading to a very high primary energy supply. In the decentralized solution, Estonia could benefit from the advantage of cogeneration leading to very low fuel consumption. But this latter strategy depends on the restoration of the district heating systems. This article seeks to form a strategy to improve the efficiency of the Estonian energy system by increasing the use of cogeneration. (author)

  11. Vitality of the Estonian forests (results of the inventory and research)

    International Nuclear Information System (INIS)

    Karoles, K.

    1991-01-01

    Factors affecting Estonian forests are: The environmental, specially atmospheric pollution, - the foundation of new forests as monoculture on unsuitable locations, - mechanical damages by unsuitable forest machinery, - unfavourable water conditions, - Heterobasidion or Armillaria rot roots. Local damages in consequence of air pollutants are distributed in environments of Tallinn, Kivioli, Kohtla-Jaerve and the thermal power stations (Narva), where the SO 2 -content in the air is on the average higher than 50 (80) μg/m 3 . Pine forests on dry sand soils (600 ha damaged in 1989) and the older spruce forests show the new type of forest decline. High Al-ion concentration, disturbances of the Ca-Mg-metabolism, an extreme nutrient deficit, (specially N-deficit) and periodical water deficit as well as pathogenic fungi are damaging the trees. Spruces show nonspecific defoliation, needle necrosis, needlefall, occurence of fungal diseases. More damaged are the spruce forests in regions with basic precipitations and high sulphur-deposition. (orig./UWA) [de

  12. Gender differences in factors associated with sexual intercourse among Estonian adolescents.

    Science.gov (United States)

    Part, Kai; Rahu, Kaja; Rahu, Mati; Karro, Helle

    2011-06-01

    To examine factors associated with early sexual intercourse among 15 to 16-year-old adolescents by gender. The data were collected from a random sample of Estonian basic schools' ninth grade pupils in 1999 using self-completed questionnaires. A multivariate logistic regression analysis for boys and girls was used to test for associations between sexual intercourse, and personal gender role-related attitudes, attitudes towards sexual intercourse, pubertal timing, smoking status and experience of drunkenness. Of the respondents, 14.6% of boys and 13.1% of girls had experienced sexual intercourse. Traditional gender role-related attitudes were associated with sexual intercourse among girls, but not among boys. Smoking and experience of drunkenness was strongly associated with sexual intercourse for both genders. Gender differences in the association between gender role-related attitudes and early sexual intercourse were observed among 15 to 16-year-olds in Estonia. Smoking and experience of drunkenness were strongly related to sexual intercourse for both genders.

  13. Sexual behavior, depressive feelings, and suicidality among Estonian school children aged 13 to 15 years.

    Science.gov (United States)

    Heidmets, L; Samm, A; Sisask, M; Kõlves, K; Aasvee, K; Värnik, A

    2010-01-01

    The present paper is based on a WHO Collaborative Cross-National Study "Health Behavior in School-Aged Children (HBSC)." It aimed at describing and analyzing how the sexual behaviors of 13- to 15-year-old Estonian school children were associated with self-reported depressive feelings and suicidality. Distinctive behavioral traits in relation to age of first sexual intercourse were also investigated. Self-reported questionnaires from school children (n = 3,055) were analyzed. In total, 15.2% of school children reported being nonvirgin. Among 13-year-olds, 2.9% of girls and 6.8% of boys were nonvirgins. Approximately 25% of the 15-year-old girls and boys were nonvirgins. The likelihood of depressive feelings and suicidal ideation increased significantly in both genders with loss of virginity. Boys who had lost their virginity at 13 years or younger were 4.2 times more likely to have suicidal thoughts; comparable girls were 7.8 times more likely to have suicidal thoughts. Compared to virgins, youths who had lost their virginity reported poor self-assessed health and more risk behaviors in themselves and their peers. Experiences of sexual intercourse increased the odds ratios for depressive feelings and suicidality. The earlier sexual intercourse was initiated, the greater were the odds of lower mental well-being. Risk behaviors emerged as a complex phenomenon requiring complex prevention.

  14. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  15. Implementation of quality assurance and quality control in the Nuclear Analytical Laboratory of the Estonian Radiation Protection Centre

    International Nuclear Information System (INIS)

    Koeoep, T.; Jakobson, E.

    2002-01-01

    The Analytical Laboratory of the Estonian Radiation Protection Centre is in the process of implementing the system of Quality Assurance (QA) and Quality Control (QC) in the framework of the IAEA TC Project RER/2/004/ 'QA/QC of Nuclear Analytical Techniques'. The draft Quality Manual with annexes has been prepared accordingly to the ISO 17025 Guide, documents and other printed material delivered on the seminars of the project. The laboratory supply has been supplemented with necessary equipment for guaranteeing of quality. Proficiency testing included in the project has been performed successfully. (author)

  16. Bernhard Linde. Noor-Eesti vooriülem. Bernhard Linde. Leader of the Young Estonian Pack

    OpenAIRE

    Jaanus Kulli

    2012-01-01

    Bernhard Linde (1886–1954) was a recognized and prolific Estonian theatre critic of the first quarter of the 20th century, who mediated and propagated western as well as eastern European theatrical innovations. In addition, he was active as a literary and art critic, publisher, and proponent of libraries, to a modest extent he was a prose writer and poet. Unquestionably, however, Bernhard Linde’s most prominent role was as one of the founding members of the literary movement Young Estonia. He...

  17. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  18. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  19. The Baltic Klint beneath the central Baltic Sea and its comparison with the North Estonian Klint

    Science.gov (United States)

    Tuuling, Igor; Flodén, Tom

    2016-06-01

    Along its contact with the Baltic Shield, the margin of the East European Platform reveals a well-developed, flooded terraced relief. The most striking and consistent set of escarpments at the contact of the Lower Palaeozoic calcareous and terrigenous rocks, known as the Baltic Klint (BK), extends from northwest of Russia to the Swedish island of Öland. Marine seismic reflection profiling in 1990-2004 revealed the central Baltic Sea Klint (BSK) section in detail and enabled comparison of its geology/geomorphology with a classical klint-section onshore, namely the North Estonian Klint (NEK). The conception of the BK onshore, which is based on the land-sea separating terraced relief in northern Estonia, is not fully applicable beneath the sea. Therefore, we consider that the BSK includes the entire terraced Cambrian outcrop. We suggest the term "Baltic Klint Complex" to include the well-terraced margin of the Ordovician limestone outcrop, which is weakly developed in Estonia. Because of a steady lithological framework of the bedrock layers across the southern slope of the Fennoscandian Shield, the central BSK in the western and the NEK in the eastern part of the Baltic Homocline have largely identical morphologies. The North Estonian Ordovician limestone plateau with the calcareous crest of the BK extends across the central Baltic Sea, whereas morphological changes/variations along the Klint base occur due to the east-westerly lithostratigraphic/thickness changes in the siliciclastic Cambrian sequence. The verge of the NEK, located some 30-50 m above sea level, starts to drop in altitude as its east-westerly course turns to northeast-southwest in western Estonia. Further westwards, the BK shifts gradually into southerly deepening (0.1-0.2°) layers as its crest drops to c. 150 m below sea level (b.s.l.) near Gotska Sandön. This course change is accompanied by a considerable decrease in thickness of the platform sedimentary cover, as below the central Baltic Sea the

  20. Spatial Culture

    DEFF Research Database (Denmark)

    Reeh, Henrik

    2012-01-01

    Spatial Culture – A Humanities Perspective Abstract of introductory essay by Henrik Reeh Secured by alliances between socio-political development and cultural practices, a new field of humanistic studies in spatial culture has developed since the 1990s. To focus on links between urban culture...... and modern society is, however, an intellectual practice which has a much longer history. Already in the 1980s, the debate on the modern and the postmodern cited Paris and Los Angeles as spatio-cultural illustrations of these major philosophical concepts. Earlier, in the history of critical studies, the work...... Foucault considered a constitutive feature of 20th-century thinking and one that continues to occupy intellectual and cultural debates in the third millennium. A conceptual framework is, nevertheless, necessary, if the humanities are to adequa-tely address city and space – themes that have long been...

  1. Attitudes of Academic Staff towards Their Own Work and towards External Evaluation, from the Perspective of Self-Determination Theory: Estonian Case

    Science.gov (United States)

    Seema, Riin; Udam, Maiki; Mattisen, Heli

    2016-01-01

    The purpose of this study was to ascertain the attitudes of academic staff towards their own work as well as towards external evaluations. The study was based on (1) an analysis of assessment reports of institutional accreditations conducted by the Estonian Quality Agency for Higher and Vocational Education and (2) self-determination theory on…

  2. “... if there’s a party, then there’s definitely alcohol”. Construction of partying practices and abstinence in Estonian youth forums

    Directory of Open Access Journals (Sweden)

    Parder Mari-Liisa

    2015-12-01

    Full Text Available AIMS – Adolescents’ abstinence from alcohol has not been much researched in terms of providing suggestions for prevention strategies. This study aims to fill that gap by offering a practice theory-inspired analysis of how the unwritten rules of partying practices are communicated between posters of Estonian youth forums.

  3. Corporate Governance from the Perspective of Stakeholder Theory and in Light of Perceptions among Estonian Owners and Managers of Relations with Stakeholders / Mari Kooskora

    Index Scriptorium Estoniae

    Kooskora, Mari, 1969-

    2006-01-01

    Äriühingute valitsemise kontseptsioon ja teoreetiline taust; Eesti omanike ja tippjuhtide ootused suhetes erinevate huvigruppidega ning äriühingute valitsemine huvigruppide teooriast lähtudes. Skeem: The stakeholder model. Tabelid: Contractual and community stakeholders; Overview of how perceptions of the main stakeholder groups among Estonian business leaders between 1995-2004 have changed

  4. Economic modelling of the capture-transport-sink scenario of industrial CO2 emissions: The Estonian-Latvian cross-border case study

    NARCIS (Netherlands)

    Shogenova, A.; Shogenov, K.; Pomeranceva, R.; Nulle, I.; Neele, F.; Hendriks, C.

    2011-01-01

    Industrial CO2 emissions and opportunities for CO2 geological storage in the Baltic Region were studied within the EU GeoCapacity project supported by the European Union Framework Programme 6. Estonia produces the largest amounts of CO2 emissions in the region, due to the combustion of Estonian oil

  5. The Role of Parents and Parental Mediation on 0-3-Year Olds' Digital Play with Smart Devices: Estonian Parents' Attitudes and Practices

    Science.gov (United States)

    Nevski, Elyna; Siibak, Andra

    2016-01-01

    In this manuscript, we analyse the attitudes and practices of Estonian parents (N = 198) who allowed their 0-3-year olds to use smart devices. We aimed to discover if there was an interaction between parental use of smart technologies, parents' attitudes and the child's age that would predict young children's usage of smart devices. We also wanted…

  6. Occurrence of clinical mastitis in primiparous Estonian dairy cows in different housing conditions

    Directory of Open Access Journals (Sweden)

    Aasmäe Birgit

    2006-11-01

    Full Text Available Abstract Background Objectives of the study were to document the impact of some management factors on the occurrence of clinical mastitis in primiparous dairy cows and to identify common udder pathogens of clinical mastitis in freshly calved heifers and multiparous cows on the day of calving. Methods A one-year study was conducted during 2004 and 2005 in 11 selected Estonian dairy herds. Data consisted of 68 heifers with clinical mastitis and 995 heifers without clinical mastitis on the day of calving. Multivariable logistic regression with a random herd effect was used to investigate any association between housing system or the time interval from movement of heifers to the calving facility and day of calving on occurrence of clinical mastitis. Milk samples for bacteriological analysis were collected from affected heifers and multiparous cows on the day of calving Results Clinical mastitis occurrence in the study population of freshly calved heifers equalled 6.1 %. Housing system was not a significant risk factor for clinical mastitis of freshly calved heifers. Moving heifers to the cowbarn less than two weeks before calving in tiestall farms increased risk (OR = 5.9 p = 0.001 for clinical mastitis at parturition. The most frequently isolated udder pathogens among heifers were Escherichia coli (22.1%, Streptococcus uberis (19.1% and coagulase-negative staphylococci (8.8%. In comparison, the main pathogen in multiparous cows with clinical mastitis at parturition was Staphylococcus aureus (11.2%. Conclusion Moving heifers to the calving facilities too late in tiestall farms increased risk for clinical mastitis at parturition. The isolated udder pathogens did not differ significantly in tiestall farms compared to freestall farms in heifers, but differences were found between heifers and multiparous cows at parturition.

  7. Non-cancer morbidity among Estonian Chernobyl cleanup workers: a register-based cohort study.

    Science.gov (United States)

    Rahu, Kaja; Bromet, Evelyn J; Hakulinen, Timo; Auvinen, Anssi; Uusküla, Anneli; Rahu, Mati

    2014-05-14

    To examine non-cancer morbidity in the Estonian Chernobyl cleanup workers cohort compared with the population sample with special attention to radiation-related diseases and mental health disorders. Register-based cohort study. Estonia. An exposed cohort of 3680 men (cleanup workers) and an unexposed cohort of 7631 men (population sample) were followed from 2004 to 2012 through the Population Registry and Health Insurance Fund database. Morbidity in the exposed cohort compared with the unexposed controls was estimated in terms of rate ratio (RR) with 95% CIs using Poisson regression models. Elevated morbidity in the exposed cohort was found for diseases of the nervous system, digestive system, musculoskeletal system, ischaemic heart disease and for external causes. The most salient excess risk was observed for thyroid diseases (RR=1.69; 95% CI 1.38 to 2.07), intentional self-harm (RR=1.47; 95% CI 1.04 to 2.09) and selected alcohol-related diagnoses (RR=1.25; 95% CI 1.12 to 1.39). No increase in morbidity for stress reactions, depression, headaches or sleep disorders was detected. No obvious excess morbidity consistent with biological effects of radiation was seen in the exposed cohort, with the possible exception of benign thyroid diseases. Increased alcohol-induced morbidity may reflect alcohol abuse, and could underlie some of the higher morbidity rates. Mental disorders in the exposed cohort were probably under-reported. The future challenge will be to study mental and physical comorbidities in the Chernobyl cleanup workers cohort. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. Personality traits and eating habits in a large sample of Estonians.

    Science.gov (United States)

    Mõttus, René; Realo, Anu; Allik, Jüri; Deary, Ian J; Esko, Tõnu; Metspalu, Andres

    2012-11-01

    Diet has health consequences, which makes knowing the psychological correlates of dietary habits important. Associations between dietary habits and personality traits were examined in a large sample of Estonians (N = 1,691) aged between 18 and 89 years. Dietary habits were measured using 11 items, which grouped into two factors reflecting (a) health aware and (b) traditional dietary patterns. The health aware diet factor was defined by eating more cereal and dairy products, fish, vegetables and fruits. The traditional diet factor was defined by eating more potatoes, meat and meat products, and bread. Personality was assessed by participants themselves and by people who knew them well. The questionnaire used was the NEO Personality Inventory-3, which measures the Five-Factor Model personality broad traits of Neuroticism, Extraversion, Openness, Agreeableness, and Conscientiousness, along with six facets for each trait. Gender, age and educational level were controlled for. Higher scores on the health aware diet factor were associated with lower Neuroticism, and higher Extraversion, Openness and Conscientiousness (effect sizes were modest: r = .11 to 0.17 in self-ratings, and r = .08 to 0.11 in informant-ratings, ps < 0.01 or lower). Higher scores on the traditional diet factor were related to lower levels of Openness (r = -0.14 and -0.13, p < .001, self- and informant-ratings, respectively). Endorsement of healthy and avoidance of traditional dietary items are associated with people's personality trait levels, especially higher Openness. The results may inform dietary interventions with respect to possible barriers to diet change.

  9. The Estonian study of Chernobyl cleanup workers: I. Design and questionnaire data

    International Nuclear Information System (INIS)

    Tekkel, M.; Rahu, M.; Veidebaum, T.

    1997-01-01

    Nearly 2% of the male population of Estonia aged 20-39 years were sent to Chernobyl to assist in the cleanup activities after the reactor accident. A cohort of 4,833 cleanup workers was assembled based on multiple and independent sources of information. Information obtained from 3,704 responses to a detailed questionnaire indicated that 63% of the workers were sent to Chernobyl in 1986; 54% were of Estonian and 35% of Russian ethnicity; 72% were married, and 1,164 of their 5,392 children were conceived after the Chernobyl disaster. The workers were less educated than their counterparts than their counterparts in the general population of Estonia, and only 8.5% had attended university. Based on doses entered in workers records, the mean dose was 11 cGy, with only 1.4% over 25 cGy. Nearly 85% of the workers were sent as part of military training activities, and more than half spent in excess of 3 months in the Chernobyl area. Thirty-six percent of the workers reported having worked within the immediate vicinity of the accident site; 11.5% worked on the roofs near the damaged reactor, clearing the highly radioactive debris. The most commonly performed task was the removal and burial of topsoil (55% of the workers). Potassium iodide was given to over 18% of the men. The study design also incorporates biological indicators of exposure based on the glycophorin A mutational assay of red blood cells and chromosome translocation analyses of lymphocytes; record linkage with national cancer registry and mortality registry files to determine cancer incidence and cause-specific mortality; thyroid screening examinations with ultrasound and fine-needle biopsy; and cryopreserved white blood cells and plasma for future molecular studies. Comprehensive studies of Chernobyl cleanup workers have potential to provide a new information about cancer risks due to protracted exposures to ionizing radiation. 21 refs., 1 fig., 11 tabs

  10. Omaeluloolisus eesti teatris: Merle Karusoo lavastustest. Life Narratives and Estonian Theatre: The Productions of Merle Karusoo

    Directory of Open Access Journals (Sweden)

    Piret Kruuspere

    2012-04-01

    Full Text Available Any consideration of Estonian theatre from the point of view of biographical theatre needs to include the work of playwright and director Merle Karusoo. Productions based on various life narratives (diaries, letters, biographical interviews form the core of her work that can be defined as biographical or memory theatre. Her work has also been viewed within the context of community theatre or political theatre; Karusoo has herself referred to her work as sociological theatre. Life narratives have functioned in Karusoo’s productions as the basis for restoring oppressed or denied collective discourses of memory. Her productions emerged within the framework of the more general process of restoration of historical heritage and the rehabilitation of collective memory at the end of the 1980s and the beginning of the 1990s. Life story can be viewed as the essence of Merle Karusoo’s theatre. The personal in the life story in the production activates the emotional memory of the audience; for older generations such theatre facilitates a legitimisation of remembering one’s life story in entirety, and for younger generations it functions as a vehicle of collective, historical and national memory. The current article outlines the main stages of Karusoo’s biographical theatre, highlights major productions of each stage and provides an overview of their reception. Karusoo’s theatre dates back to 1980s. Productions based on life stories of the generations born in 1950s and 1960s, Meie elulood (Our Biographies and Kui ruumid on täis ... (Full Rooms both in 1982, mediated fragments of life stories of 16 drama students, focusing on the processes of self-conception and -reflection of young persons. In the context of the Soviet regime that exerted firm ideological control over the private lives of its citizens, Karusoo’s productions struck an especially powerful and unusual chord. Karusoo’s biographical theatre has gathered momentum and assumed a more

  11. The dominance of indirect taxes in Estonian state budget. Summary:Kaudsete maksude dominant Eesti riigieelarve tuludes

    Directory of Open Access Journals (Sweden)

    Olev Raju

    2013-09-01

    Full Text Available Recession has sharply erected the question of tax burden and the optimal proportion of different kinds of taxes among the incomes of the budget. Indirect taxes and consumption taxes, which proportion is different according to different methodologies, dominate in Estonian state budget. The buoyancy of a tax system based on taxes of that kind is especially weak during the recession. The purpose of Estonian government’s economic policy during the highest peak of crisis was to keep the budget in balance. Instead of recovering economy the taxes were arisen and costs were reduced. The results of such a policy aren’t still clear. Difficulties concerning the incomes of budget have arisen the necessity for lifting taxes, which is possible as the tax burden is low now. But a sharp question of the optimal level of taxes is going to be raised. A formula for indirect tax optimum according to Ramsey taxes and Slutski decomposition has been proposed in the article

  12. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  13. Riik võib lüüa SAS-i esmaspäevaks Estonian Airi omanikeringist välja / Erik Müürsepp, Mikk Salu

    Index Scriptorium Estoniae

    Müürsepp, Erik

    2008-01-01

    SAS osaleb Estonian Airþile lisakapitali eraldamises ainult juhul, kui Eesti riik müüb oma osaluses lennukompaniis SAS-ile. Peaminister Andrus Ansipi ning majandus- ja kommunikatsiooniminister Juhan Partsi seisukoht

  14. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  15. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  16. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  17. Context-Related Melodies in Oral Culture: An Attempt to Describe Words-and-Music Relationships in Local Singing Tradition

    Directory of Open Access Journals (Sweden)

    Taive Särg

    2009-08-01

    Full Text Available In oral folk song traditions we often find many lyrics, but not nearly as many melodies. The terms “polyfunctionalism”, “group melodies” or “general melodies” have been used by Estonian researches to indicate the phenomenon that many lyrics were sung to only one, or a small handful, of tunes. The scarcity of melodies is supposed to be one of several related phenomena characteristic to an oral, text-centred singing culture.In this article the Estonian folk song tradition will be analysed against a quantity of melodies and their usage in the following aspects: word-and-melody relationships and context-and-melody relationships in Karksi parish (south Estonia; a singer; and native musical terms and the process of singing and (recreation.

  18. Postmodernistlikke jooni eesti noore režissuuri lavastustes 1969–1975 / Postmodernist Traits in the Performances of Young Estonian Directors 1969-1975

    Directory of Open Access Journals (Sweden)

    Rein Heinsalu

    2015-06-01

    Full Text Available Teesid: 1960. aastate lõpus toimusid eesti teatris suured muutused. Ilmus nähtus, mida hakati nimetama nooreks režissuuriks. Eeskätt on see seotud Evald Hermaküla, Jaan Toominga, Kalju Komissarovi, Kaarin Raidi jt nimedega. Noor režissuur tõstis mässu ahtaks muutunud realismi raamide vastu, mis ei vastanud noore põlvkonna teatriootustele. Olles mõjutatud ideeliselt radikaalsest eksperimentaalteatrist USAs, aga ka Jerzy Grotowski katsetustest ning teistest avangardsetest liikumistest, muutis see füüsilist teatrikeelt. Tõusis improvisatsiooni osakaal. Teater lakkas olemast dramaturgiliste tekstide esituskoht, vaid hakkas otsima etendustes vahetut kohalolu. Tajuprotsessi hakkas juhtima mängu põhimõte. Suured müüdid dekonstrueeriti, autoritaarsusele vastanduti. Seksuaalsus ilmutas end uuel jõul, toetatud alateadvuse impulssidest. Uue laine radikaalsus kestis 1970. aastate lõpuni, mil see sulandus peavoolu. Murrang teatriesteetikas mõjutas kogu järgnenud teatriperioodi, seda on kutsutud ka eesti teatri kuldajaks. SU M M A R Y Young directors emerged in Estonian theatre at the end of the 1960s. More specifically, during the years 1969–1974 many new directors’ names appeared on theatre posters, and the fundamental changes in the language and content of the theatre at the end of the 1960s and the 1970s began to be associated with these names. Most important among these are Evald Hermaküla, Jaan Tooming, Kalju Komissarov, and Karin Raid. Within a short time these young directors changed prevailing assumptions about the purpose, means, and content of the theatre in Estonia. This phenomenon came to be referred to as the breakthrough, or the new wave; later on, in sum, as the renewal of theatre. A generational change was taking place in the theatre, and in this framework a different language of theatre emerged, which began carrying innovative emotional and aesthetic paradigms. As in the Anglo-American cultural space, this new

  19. Computation of Estonian CORS data using Bernese 5.2 and Gipsy 6.4 softwares

    Science.gov (United States)

    Kollo, Karin; Kall, Tarmo; Liibusk, Aive

    2017-04-01

    GNSS permanent station network in Estonia (ESTREF) was established already in 2007. In 2014-15 extensive reconstruction of ESTREF was carried out, including the establishment of 18 new stations, change of the hardware in CORS stations as well as establishing GNSS-RTK service for the whole Estonia. For GNSS-RTK service one needs precise coordinates in well-defined reference frame, i.e., ETRS89. For long time stability of stations and time-series analysis the re-processing of Estonian CORS data is ongoing. We re-process data from 2007 until 2015 with program Bernese GNSS 5.2 (Dach, 2015). For the set of ESTREF stations established in 2007, we perform as well computations with GIPSY 6.4 software (Ries et al., 2015). In the computations daily GPS-only solution was used. For precise orbits, final products from CODE (CODE analysis centre at the Astronomical Institute of the University of Bern) and JPL (Jet Propulsion Laboratory) for Bernese and GIPSY solutions were used, respectively. The cut-off angle was set to 10 degrees in order to avoid near-field multipath influence. In GIPSY, precise point positioning method with fixing ambiguities was used. Bernese calculations were performed based on double difference processing. Antenna phase centers were modelled based on igs08.atx and epnc_08.atx files. Vienna mapping function was used for mapping tropospheric delays. For the GIPSY solution, the higher order ionospheric term was modelled based on IRI-2012b model. For the Bernese solution higher order ionospheric term was neglected. FES2004 ocean tide loading model was used for the both computation strategies. As a result, two solutions using different scientific GNSS computation programs were obtained. The results from Bernese and GIPSY solutions were compared, using station repeatability values, RMS and coordinate differences. KEYWORDS: GNSS reference station network, Bernese GNSS 5.2, Gipsy 6.4, Estonia. References: Dach, R., S. Lutz, P. Walser, P. Fridez (Eds); 2015

  20. Towards The Operational Oceanographic Model System In Estonian Coastal Sea, Baltic Sea

    Science.gov (United States)

    Kõuts, T.; Elken, J.; Raudsepp, U.

    An integrated system of nested 2D and 3D hydrodynamic models together with real time forcing data asquisition is designed and set up in pre-operational mode in the Gulf of Finland and Gulf of Riga, the Baltic Sea. Along the Estonian coast, implicit time-stepping 3D models are used in the deep bays and 2D models in the shallow bays with ca 200 m horizontal grid step. Specific model setups have been verified by in situ current measurements. Optimum configuration of initial parameters has been found for certain critical locations, usually ports, oil terminals, etc. Operational system in- tegrates also section of historical database of most important hydrologic parameters in the region, allowing use of certain statistical analysis and proper setup of initial conditions for oceanographic models. There is large variety of applications for such model system, ranging from environmental impact assessment at local coastal sea pol- lution problems to forecast of offshore blue algal blooms. Most probable risk factor in the coastal sea engineering is oil pollution, therefore current operational model sys- tem has direct custom oriented output the oil spill forecast for critical locations. Oil spill module of the operational system consist the automatic weather and hydromet- ric station (distributed in real time to internet) and prognostic model of sea surface currents. System is run using last 48 hour wind data and wind forecast and estimates probable oil deposition areas on the shoreline under certain weather conditions. Cal- culated evolution of oil pollution has been compared with some real accidents in the past and there was found good agreement between model and measurements. Graphi- cal user interface of oil spill model is currently installed at location of port authorities (eg. Muuga port), so in case of accidents it could be used in real time supporting the rescue operations. In 2000 current pre-operational oceanographic model system has been sucessfully used to

  1. Plant pathogen culture collections: it takes a village to preserve these resources vital to the advancement of agricultural security and plant pathology.

    Science.gov (United States)

    Kang, Seogchan; Blair, Jaime E; Geiser, David M; Khang, Chang-Hyun; Park, Sook-Young; Gahegan, Mark; O'Donnell, Kerry; Luster, Douglas G; Kim, Seong H; Ivors, Kelly L; Lee, Yong-Hwan; Lee, Yin-Won; Grünwald, Niklaus J; Martin, Frank M; Coffey, Michael D; Veeraraghavan, Narayanan; Makalowska, Izabela

    2006-09-01

    ABSTRACT Plant pathogen culture collections are essential resources in our fight against plant disease and for connecting discoveries of the present with established knowledge of the past. However, available infrastructure in support of culture collections is in serious need of improvement, and we continually face the risk of losing many of these collections. As novel and reemerging plant pathogens threaten agriculture, their timely identification and monitoring depends on rapid access to cultures representing the known diversity of plant pathogens along with genotypic, phenotypic, and epidemiological data associated with them. Archiving such data in a format that can be easily accessed and searched is essential for rapid assessment of potential risk and can help track the change and movement of pathogens. The underexplored pathogen diversity in nature further underscores the importance of cataloguing pathogen cultures. Realizing the potential of pathogen genomics as a foundation for developing effective disease control also hinges on how effectively we use the sequenced isolate as a reference to understand the genetic and phenotypic diversity within a pathogen species. In this letter, we propose a number of measures for improving pathogen culture collections.

  2. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  3. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  6. Chemical composition of anthropogenic particles on needles collected close to the Estonian oil-shale power plants

    International Nuclear Information System (INIS)

    Meinander, O.

    1995-01-01

    Within the countries surrounding the Baltic Sea, north-eastern Estonia is among the most polluted areas. Emissions from the oil-shale power plants produce air pollution problems both locally and on a larger scale. In the atmosphere, pollutants mix and convert. Consequently, the particles deposited due to the use of oil-shale can have various chemical compositions. From the point of view of air chemistry, ecological effects and air pollution modelling, knowledge of the chemical composition of the deposited particles can be of great value. The aim of this work was to study the chemical composition of single anthropogenic particles occurring on needle surfaces in north-eastern Estonia and Southern Finland close to the Estonian oil-shale power plants. For the purpose, scanning electron microscopical microanalysis was used

  7. The Problems of Estonian R&D and Innovation Strategy and the Demand-Side Innovation Policies

    Directory of Open Access Journals (Sweden)

    Tõnu Roolaht

    2012-12-01

    Full Text Available The second larger Estonian R&D and Innovation Strategy ‘Knowledge-based Estonia 2007-2013’ is aimed at continuing the advancement of research and development efforts towards an innovative knowledge-based society and economic system in Estonia. Fostering of knowledge-based high-tech industries is seen as paramount for retaining country’s competitive advantage. However, the mid-term evaluations indicate that several goals of the strategy might not be achievable by 2013. In fact, the policy measures have been much more successful in developing scientific research, as indicated by increased international publication, number of patents, and number of researchers and engineers. The advances in development of high-tech products and services through innovations are noticeable but less prominent. The purpose of this study is to suggest the role for demand-side innovation policies in helping to advance commercial development and innovation

  8. Iseseisvusdeklaratsioonid 1776–1918. The Estonian Declaration of Sovereignty: An Example of the Civilizing Force of Hypocrisy

    Directory of Open Access Journals (Sweden)

    Hent Kalmo

    2012-06-01

    Full Text Available Sovereignty has been characterised as a form of “organized hypocrisy”, a system governed by a set of rules that are generally recognised as binding and yet are continually infringed upon by the most powerful actors. This idea can be extended to analyse the role of sovereignty within the Soviet Union. The Soviet Union was nominally governed by a Constitution which endowed the Union Republics with the right of secession, but there was no realistic possibility of exercising this right. One should not rush to conclude, however, that the actual wording of the Soviet Constitution of 1977 was entirely without relevance. As Jon Elster has argued, hypocrisy can have a “civilizing force” when the need to appear impartial and to retain public credibility forces actors to choose a strategy they would not choose otherwise. A good example of this kind of argumentative constraint is offered by the dilemma faced by the Soviet leadership after the mid-1980s, as it became reluctant to use military force to suppress independence movements within the Baltic States while, at the same time, promising to give more weight to the Soviet Constitution and respect the “sovereignty” of the Union Republics. In this setting, the ambiguity of the word “sovereignty” could be played upon by a whole gamut of political movements in order to further their agenda, from local communists eager to expand their autonomy within the Soviet system to those making an explicit bid for the restoration of independence. Significant legal and political changes could be justified as mere conclusions from the constitutionally recognised status of the Union Republics – a strategy which was all the more effective as Moscow struggled to formulate an alternative line of constitutional interpretation that could be used to counter the Baltic claims. This exchange of opinions escalated into a constitutional conflict in November 1988, when the Estonian Supreme Soviet responded to

  9. Field trial on progesterone cycles, metabolic profiles, body condition score and their relation to fertility in Estonian Holstein dairy cows.

    Science.gov (United States)

    Samarütel, J; Ling, K; Waldmann, A; Jaakson, H; Kaart, T; Leesmäe, A

    2008-08-01

    Resumption of luteal activity postpartum and fertility were investigated in an Estonian Holstein high milk production and good fertility dairy herd. Body condition was scored after every 10 days in 54 multiparous dairy cows (71 lactations) calving inside from December to March during 4-year period. Blood samples were taken 1-14 days before calving and 1-14, 28-42 and 63-77 days after calving: analytes estimated were serum aspartate aminotransferase (AST), glucose, ketone bodies, total cholesterol, non-esterified fatty acids and triglycerides. The general linear mixed model was used to compare the data for cows with different characteristics in luteal activity postpartum based on their milk progesterone profiles. Forty-five per cent of cases had abnormal profiles; delayed resumption of ovarian cyclicity postpartum (DC) was the most prevalent abnormality. There was no difference in body condition scores between the groups. The DC and prolonged luteal phase groups had higher serum AST activity (p fertility.

  10. Using micro-contexts to describe a writing process in Estonian as a second language across proficiency levels

    Directory of Open Access Journals (Sweden)

    Olga Pastuhhova

    2015-04-01

    Full Text Available This paper aims to describe the writing process of native Russian‑speaking students in Estonian as a second language. 34 participants were given the assignment of writing a text in the L2. The written texts were then rated as being at levels from A2 to C1 according to the Common European Framework of Reference for Languages (CEFR. The data were collected by computer keystroke logging and analysed based on the concept of a ‘micro-context’. Micro-contexts were analysed according to their frequency and duration and were compared across proficiency levels. The results show that writing in the L2 is not a smooth process. The longest transitions in micro-contexts reveal that the most cognitive effort is made between paragraphs and sentences and when deletions are involved. The growing number of consecutive deletions demonstrates that even with developing proficiency, the linear production text is subject to constant revision, correction and modification.

  11. Food Security in Azerbaijan

    Institute of Scientific and Technical Information of China (English)

    Kamran Ismayilov

    2009-01-01

    @@ In the 21st century the society got some achievements in technological,education,economic,social-political,cultural and etc.sectors.But society couldn't solve fully the food security problem yet.According to the information given by FAO if in 1970 there were 400 billion hungry people in the world,in 2008 the number of hungry people was doubled and increased to 800 billion people.

  12. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  13. Civic commitment, political culture and the Estonian inter-war generation / Li Bennich-Björkman

    Index Scriptorium Estoniae

    Bennich-Björkman, Li

    2007-01-01

    Sõdadevahelises Eesti Vabariigis väljakujunenud kodanikupanuse ja poliitilise kultuuri vaimse pärandi kaasaega edasikandumine mõjutas ülemineku ja demokratiseerumisprotsesse Eestis. Lisa: Tabelid, diagrammid

  14. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  15. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  16. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  17. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  18. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  19. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  20. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  1. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  2. Describing temporal variability of the mean Estonian precipitation series in climate time scale

    Science.gov (United States)

    Post, P.; Kärner, O.

    2009-04-01

    Applicability of the random walk type models to represent the temporal variability of various atmospheric temperature series has been successfully demonstrated recently (e.g. Kärner, 2002). Main problem in the temperature modeling is connected to the scale break in the generally self similar air temperature anomaly series (Kärner, 2005). The break separates short-range strong non-stationarity from nearly stationary longer range variability region. This is an indication of the fact that several geophysical time series show a short-range non-stationary behaviour and a stationary behaviour in longer range (Davis et al., 1996). In order to model series like that the choice of time step appears to be crucial. To characterize the long-range variability we can neglect the short-range non-stationary fluctuations, provided that we are able to model properly the long-range tendencies. The structure function (Monin and Yaglom, 1975) was used to determine an approximate segregation line between the short and the long scale in terms of modeling. The longer scale can be called climate one, because such models are applicable in scales over some decades. In order to get rid of the short-range fluctuations in daily series the variability can be examined using sufficiently long time step. In the present paper, we show that the same philosophy is useful to find a model to represent a climate-scale temporal variability of the Estonian daily mean precipitation amount series over 45 years (1961-2005). Temporal variability of the obtained daily time series is examined by means of an autoregressive and integrated moving average (ARIMA) family model of the type (0,1,1). This model is applicable for daily precipitation simulating if to select an appropriate time step that enables us to neglet the short-range non-stationary fluctuations. A considerably longer time step than one day (30 days) is used in the current paper to model the precipitation time series variability. Each ARIMA (0

  3. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  4. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  5. ON THE CONCEPT OF CULTURE AND FOOD CULTURE FOR GRAIN & OIL JOURNALS More discussions on the cultural mission of grain & oil journals in protecting national food security and implementing national food strategy%论粮油期刊文化与粮食文化观——兼论粮油期刊在保障国家粮食安全实施国家粮食战略中的文化使命

    Institute of Scientific and Technical Information of China (English)

    吴成福

    2012-01-01

    The paper puts forward the outlook of food culture based on China' s outstanding traditional culture and advanced contemporary culture, i.e. "the masses regard food as their prime want", which is the concept of food political culture ; " agriculture is the base of all industries while food is the base of agriculture", which is the concept of food economic culture; "make a profit for the tillers of the soil, bring benefit to dieters", which is the concept of food administrative culture; "I would rather stream thousands of drops of sweat, not destroy one grain", which is the outlook of food business culture; "sci-tech innovation escorts for food", which is the outlook of food sci-tech culture; "each grain in your dish is a fruit of hard labor", which is the outlook of food consumption culture; "food safety is regarded as the top priority", which is the concept of food security culture ; "saving food is glorious while wasting food is shameful", which is the concept of food ethical culture ; "color, aromafood aesthetic taste, meaning, form, nutrition", which is the concept of food aesthetic culture; " one does not feel alarmed with food in the hands", which is the concept of food philosophy culture. The paper discusses the relationship between grain & oil journals and food culture as well as the cultural mis- sion of grain & oil journals in protecting national food security and implementing national food strategy.%提出了基于我国优秀传统文化和当代先进文化的粮食文化观,即:“民以食为天”之粮食政治文化观;“农业乃百业之基,粮食乃农业之基”之粮食经济文化观;“为耕者谋利,为食者造福”之粮食行政文化观;“宁流千滴汗,不坏一粒粮”之粮食企业文化观;“技术创新为粮食保驾护航”之粮食科技文化观;“谁知盘中餐,粒粒皆辛苦”之粮食消费文化观;“食以安为先”之粮食安全文

  6. America's Cultural Awakening

    National Research Council Canada - National Science Library

    Brents, William B

    2007-01-01

    Although the collapse of the Soviet Union elevated the United States to a hyper superpower status, globalization in terms of modernity, economics, security, and culture would dramatically affect its ascendancy...

  7. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  8. Non-market value of Estonian seminatural grasslands: a contingent valuation study. Eesti poolloodusliku rohumaa turuväline väärtus: tingliku hindamise uuring

    Directory of Open Access Journals (Sweden)

    Helli Lepasaar

    2015-12-01

    Full Text Available Seminatural grasslands i.e. the floodplain meadows, seashore meadows, wooded meadows, dry meadows, wooded pastures are the very traditional part of Estonian landscapes, which play an important role in the appearance of the landscape in general and also serve as an important habitat for many plant and animal species. In order to preserve the seminatural grasslands continuous annual mowing and/or pasturing is needed. This activity is not economically profitable and needs subsidizing. The authors of the work raise a hypothesis that the Estonian seminatural grasslands could be viewed as a valuable non-market environmental good for which a significant public demand exists. In order to find out the non-market value of the seminatural grasslands a contingent valuation study was carried out among the Estonian working-age population (size of the sample 1061 individuals. The average individual willingness to pay was 11.3 euros. During the study, the authors constructed the total demand function and discovered that the total annual demand for seminatural grasslands was 17.9 million euros.

  9. The Connotation and Extension of Agricultural Water Resources Security

    Institute of Scientific and Technical Information of China (English)

    LIU Bu-chun; MEI Xu-rong; LI Yu-zhong; YANG You-lu

    2007-01-01

    The objective of this study is to define agricultural water resources security and its connotation and extension. The definitions of water security, water resources security, and water environment security were summarized, and their relationship was differentiated and analyzed. Based on these, the elements of the conception of agricultural water resources security were hashed and the conception was defined. Agricultural water resources security is the provision of water resource that ensures protection of agriculture against threat, hazards, destruction, and loss. Moreover, the connotation and extension of agricultural water resources security were ascertained. In detail, the connotation of the definition has natural attributes, socioeconomic attributes, and cultural attributes. The extensions of agricultural water resources security include both broad and narrow ones, as well as, food security, agroenvironmental security, agroeconomic security, rural society security, etc. The definition will serve as the frame of reference for developing the researches, limiting the frame of the theory, and founding a appraising system for agricultural water resources security.

  10. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  11. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  12. The immigrant and the misunderstanding of emergency: The influence of frame security in the practical experimentation of an innovative one of cultural mediation on road / L’immigrato e il malintenso della sicurezza: L’influenza del frame sicuritario nella sperimentazione di una practica innovative di mediazione culturale su strada

    Directory of Open Access Journals (Sweden)

    Vincenzo Romania

    2009-10-01

    Full Text Available This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the dynamics of role construction in experimental trial “cultural This paper aims at analyzing the

  13. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  14. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  15. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  16. Experiences of a long-term randomized controlled prevention trial in a maiden environment: Estonian Postmenopausal Hormone Therapy trial

    Directory of Open Access Journals (Sweden)

    Rahu Mati

    2008-08-01

    Full Text Available Abstract Background Preventive drugs require long-term trials to show their effectiveness or harms and often a lot of changes occur during post-marketing studies. The purpose of this article is to describe the research process in a long-term randomized controlled trial and discuss the impact and consequences of changes in the research environment. Methods The Estonian Postmenopausal Hormone Therapy trial (EPHT, originally planned to continue for five years, was planned in co-operation with the Women's International Study of Long-Duration Oestrogen after Menopause (WISDOM in the UK. In addition to health outcomes, EPHT was specifically designed to study the impact of postmenopausal hormone therapy (HT on health services utilization. Results After EPHT recruited in 1999–2001 the Women's Health Initiative (WHI in the USA decided to stop the estrogen-progestin trial after a mean of 5.2 years in July 2002 because of increased risk of breast cancer and later in 2004 the estrogen-only trial because HT increased the risk of stroke, decreased the risk of hip fracture, and did not affect coronary heart disease incidence. WISDOM was halted in autumn 2002. These decisions had a major influence on EPHT. Conclusion Changes in Estonian society challenged EPHT to find a balance between the needs of achieving responses to the trial aims with a limited budget and simultaneously maintaining the safety of trial participants. Flexibility was the main key for success. Rapid changes are not limited only to transiting societies but are true also in developed countries and the risk must be included in planning all long-term trials. The role of ethical and data monitoring committees in situations with emerging new data from other studies needs specification. Longer funding for preventive trials and more flexibility in budgeting are mandatory. Who should prove the effectiveness of an (old drug for a new preventive indication? In preventive drug trials companies may

  17. Peace, welfare, culture

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2011-01-01

    and multiculturalism – pitted in opposition. By analytically focusing on “security narratives”, the article details how initial narratives of Muslims as threats to culture, welfare and societal peace merged and morphed to award surprising new roles to the state and multiculturalism. The re-evaluation of cultural...

  18. Investigation of Employee Security Behaviour: A Grounded Theory Approach

    OpenAIRE

    Connolly , Lena; Lang , Michael; Tygar , J. ,

    2015-01-01

    Part 5: Security Management and Human Aspects of Security; International audience; At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Information Security research with the aim to explain the effect of deterrent factors on employees’ security actions, these studies provide inconsistent and even contradictory findings. Therefore, a further...

  19. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  20. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  1. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  2. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  3. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  4. The effects of political and economic transitions on health and safety in Estonia: an Estonian-Swedish comparative study.

    Science.gov (United States)

    Kaasik, T; Andersson, R; Hörte, L G

    1998-11-01

    A general and dramatic deterioration of health in Estonia during the transition period 1990-1994 was analysed using Sweden as a comparative example. Though there were diverging trends between Estonia and Sweden in the leading cause of death, cardiovascular diseases, the gap in mortality from injury had increased most rapidly. While the injury mortality rate slightly decreased in Sweden from 1990 to 1994, it almost doubled in Estonia. In 1994, the total injury death rate for men was about 6 times higher in Estonia than in Sweden. The death rates for some types of injuries, such as alcohol intoxication and homicide, were many tenfolds higher in Estonia than in Sweden. Injury contributed the most to the widening health gap between the countries, especially in males. The mechanisms of this sudden health deterioration remain to be fully explained. It could be hypothesised that behind the traditional behavioural risk factors, the influence of socio-political factors related to economic and political reconstruction is present. A widespread risk-taking and unhealthy behaviour among Estonians can likely be partly explained as a way of coping with the distress created by the new demands of transition society. An important challenge on the way to improvement is creating the political will among policy-makers to confront the tremendous problems of controlling the factors in society that affect the population's health in Estonia.

  5. The Estonian national program for sustainable resource development and its connection with teaching about fossil fuels in chemistry courses

    International Nuclear Information System (INIS)

    Karik, H.

    1996-01-01

    The conception of sustainable resource development worked out under the initiative of the United Nations (UN) actualizes ideas for improving the health of people and the environment. The needs of people are to he addressed and, simultaneously, natural resources preserved. That is ,why ecological and economic expenses are to he integrated and flow sheets of industrial plants are to be reorganized in order to utilize natural resources in a rational way. The association of Estonia with the resolution of the UN Conference on Environmental Development held in Rio de Janeiro and the resolution of the Estonian Parliament concerning The National Program of Sustainable Development require changes in our lifestyle. Chemical education in schools has to support a change in the way of thinking and many concrete subjects can be connected with the problems of sustainable development. Metallic elements get into the environment mostly with fuel combustion ashes. According to various prognoses, fossil fuel resources will last for a thousand years. This means that more and more metallic compounds are thrown into the environment. Dispersion of metals in the air, water bodies and soil is continuously increasing. Finally, they reach the food chain and to the human body. As a result, toxicosis, illnesses, and inadvisable dislocations in organic life may occur. The trend to use ash as a raw material for metal production is considered to have some prospective economically attractive application. This would be one possible way of sustainable resource development to avoid the increase of environmental pollution and increase production of the corresponding metals

  6. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  8. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  9. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  10. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  11. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  12. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  13. Short rotation willow coppice for renewable energy and improved environment. Proceedings of a joint Swedish - Estonian seminar on energy forestry and vegetation filters

    International Nuclear Information System (INIS)

    Perttu, K.; Koppel, A.

    1996-01-01

    The overall aim of the present seminar was to present and discuss results from the joint Swedish - Estonian energy forestry research activities during the period of 1993-1995 and to publish the papers in a technical report. The results is a publication, presenting interesting methods and results, and is meant partly to serve as the final report of the joint efforts during the period mentioned, partly to be used for future planning of new projects and for application of funding for a continued cooperation. Separate abstracts have been prepared for all of the 17 papers in the report

  14. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  15. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  16. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  17. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  20. Vulnerabilities and responsibilities: dealing with monsters in computer security

    NARCIS (Netherlands)

    Pieters, Wolter; Consoli, L.

    2009-01-01

    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such

  1. Smoking prevalence and attitudes towards smoking among Estonian physicians: results from cross-sectional studies in 2002 and 2014.

    Science.gov (United States)

    Põld, Mariliis; Pärna, Kersti

    2017-11-25

    To explore smoking prevalence and attitudes towards smoking among Estonian physicians in 2002 and 2014. Two self-administered cross-sectional postal surveys were conducted among practising physicians in Estonia. Initial sample consisted of all practising physicians in Estonia. The corrected response rate was 67.8% in 2002 and 53.1% in 2014. Present study sample was restricted to physicians younger than 65 years (n=2549 in 2002, n=2339 in 2014). Age-standardised prevalence of smoking and prevalence of agreement with seven statements concerning attitudes towards smoking was determined. To analyse association of physicians' attitudes towards smoking with study year and smoking status, logistic regression analysis was used. Adjusted ORs of agreement with the seven statements were determined. Corresponding 95% CIs were calculated. The age-standardised prevalence of current smoking among men was 26.8% in 2002 and 15.3% in 2014, among women 10.4% and 5.8%, respectively. Compared with the year 2002, in 2014, prevalence of agreement with statements declaring harmfulness of smoking was higher and prevalence of agreement with statements approving smoking was lower. Adjusted ORs showed that compared with 2002, physicians' attitudes towards smoking were less favourable in 2014, and physicians' attitudes towards smoking were associated with their smoking status. Compared with 2002, the age-standardised smoking prevalence among male and female physicians was lower, and attitudes towards smoking were less approving in 2014. The smoking physicians had more approving attitudes towards smoking than their non-smoking colleagues. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Relationships between luteal activity, fertility, blood metabolites and body condition score in multiparous Estonian Holstein dairy cows under different management.

    Science.gov (United States)

    Samarütel, Jaak; Waldmann, Andres; Ling, Katri; Jaakson, Hanno; Kaart, Tanel; Leesmäe, Andres; Kärt, Olav

    2008-11-01

    The objective was to compare the relationships between luteal activity and fertility, and relate these parameters to metabolic indices and body condition changes in multiparous Estonian Holstein cows on two commercial dairy farms under different management and levels of production and nutrition (higher, H, n=54 (71 lactations) and lower, L, n=39 (39 lactations)). For statistical analysis cows were categorized according to their milk progesterone (P4) profiles as follows: normal ovarian function; delayed start of cyclicity (DC) (interval from calving to first luteal response (P45 ng/ml up to and more than 50 d respectively, followed by regular cyclicity); cessation of luteal activity (prolonged interluteal interval, P4bodies, non-esterified fatty acids, total cholesterol) and aspartate aminotransferase, body condition scores (BCS) and fertility parameters between the two farms, and also fertility parameters between the farms within P4 categories. Differences in milk fat/protein ratio, ketone body levels and BCS indicated a deeper negative energy balance (NEB) during the first month after calving on farm L. On both farms nearly 50% of the recently calved dairy cows suffered from ovarian dysfunction during the post-partum period. Delayed start of cyclicity was the most prevalent abnormal P4 profile, 25% and 28% on farms H and L, respectively. Prolonged luteal activity accounted for one-third of atypical ovarian patterns on farm H, and cessation of luteal activity on farm L. On farm L, DC cows had lower BCS values from day 10 to day 90 after calving compared with normal cows (Pcows lost more BCS (1.2 units) during the 40 d after calving than normal resumption cows (0.75 units; P<0.05). On farm H with moderate NEB the delayed start of ovulation post partum did not impair subsequent reproductive performance.

  3. Culture and Internal Security of Nepal

    Science.gov (United States)

    2012-06-08

    subsistence farming , and only 17 percent (4.5 million) of the total population reside in urban areas.2 Per capita Gross Domestic Product is 562 United...people. The influx of hundreds of international non- governmental organizations and the mushrooming of media houses did a lot to create awareness in

  4. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  5. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  6. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  7. Biological dosimetric studies in the Chernobyl radiation accident, on populations living in the contaminated areas (Gomel regions) and in Estonian clean-up workers, using FISH technique

    International Nuclear Information System (INIS)

    Darroudi, F.; Natarajan, A.T.

    1996-01-01

    In order to perform retrospective estimations of radiation doses seven years after the nuclear accident in Chernobyl, the frequencies of chromosomal aberrations in the peripheral blood lymphocytes of individuals living in contaminated areas around Chernobyl and the Estonian clean-up workers were determined. The first study group composed of 45 individuals living in four areas (i.e. Rechitsa, Komsomolski, Choiniki and Zaspa) in the vicinity (80-125 km) of Chernobyl and 20 individuals living in Minsk (control group - 340 km from Chernobyl). The second study group (Estonian clean-up workers) composed of 26 individuals involved in cleaning up the Chernobyl for a different period of time (up to 7 months) and a matched control group consisting of 9 probands. Unstable aberrations (dicentrics and rings) were scored in Giemsa stained preparations and stable aberrations (translocations) were analyzed using chromosome specific DNA libraries and fluorescence in situ hybridization (FISH) technique. For both study groups the estimated average dose is between 0,1-0,4 Gy. Among the people living in the contaminated areas in the vicinity of Chernobyl, a higher frequency of numerical aberrations (i.e. trisomy, hyper diploidy) was evident

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. A Framework for Adaptive Information Security Systems : A Holistic Investigation

    OpenAIRE

    Mwakalinga, Jeffy

    2011-01-01

    This research proposes a framework for adaptive information security systems that considers both the technical and social aspects of information systems security. Initial development of information systems security focused on computer technology and communication protocols. Researchers and designers did not consider culture, traditions, ethics, and other social issues of the people using the systems when designing and developing information security systems. They also seemed to ignore environ...

  10. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  11. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  12. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  13. “Viimne reliikvia” ja “Kolme katku vahel”: ruumist eesti ajalookirjanduse ekraniseeringutes / The Last Relic and Between Three Plagues: On Space in Film Adaptations of Estonian Historical Fiction

    Directory of Open Access Journals (Sweden)

    Eva Näripea

    2015-06-01

    Full Text Available Teesid: Artikkel keskendub kahele ajalooromaani ekraniseeringule Nõukogude Eesti filmikunstis: „Viimne reliikvia“ (1969, rež Grigori Kromanov, Tallinnfilm, mis põhineb Eduard Bornhöhe romaanil „Vürst Gabriel ehk Pirita kloostri viimsed päevad“ (1893, ning „Kolme katku vahel“ (1970, rež Virve Aruoja, Eesti Telefilm, mille seosed oma kirjandusliku allikaga (Jaan Krossi samanimelise romaaniga on oluliselt keerulisemad. Ekraniseeringuid käsitletakse ruumirepresentatsioonide perspektiivist, uurides, missuguseid strateegiaid kasutati filmiruumide loomisel, kuidas suhestuti kirjandusliku (lähtematerjaliga ning millised ajaloonarratiivi ja rahvusliku identiteedi vahekorrad neis kangastuvad. SU M M A R Y This article examines two Soviet Estonian screen adaptations of historical novels: The Last Relic (Viimne reliikvia, Tallinnfilm, 1969, directed by Grigori Kromanov, based on Eduard Bornhöhe’s novel Prince Gabriel or The Last Days of Pirita Monastery (1893, which became a box-office hit throughout the Soviet Union and even beyond; and Between Three Plagues (Kolme katku vahel, Eesti Telefilm, 1970, directed by Virve Aruoja which reached much more limited TV-audiences; the connections between this film and its literary „source“ (a novel of the same name by Jaan Kross are much more complicated. These screen adaptations are considered from the perspective of spatial representations. I examine which strategies and devices the scriptwriters, directors and production designers drew upon when constructing these cinematic spaces and how they related to their literary hypotexts. As generally for adaptations of historical novels to other media, both The Last Relic and Between Three Plagues speak (perhaps even primarily about their time of production, about the present rather than the past. In this regard, it is important to recall the role of Tallinn’s Old Town as a locus of resistance in Soviet Estonian culture. Arguably

  14. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  15. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  16. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  17. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  18. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  19. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  20. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  1. Safety, security and safeguard

    International Nuclear Information System (INIS)

    Zakariya, Nasiru Imam; Kahn, M.T.E.

    2015-01-01

    Highlights: • The 3S interface in the design of PPS is hereby proposed. • The 3S synergy enhances the reduction in vulnerability and terrorism. • Highlighted were concept of detection, delay and response. - Abstract: A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks

  2. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  3. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  4. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  5. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  7. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  8. Unique spectrum of SPAST variants in Estonian HSP patients: presence of benign missense changes but lack of exonic rearrangements

    Directory of Open Access Journals (Sweden)

    Gross-Paju Katrin

    2010-03-01

    Full Text Available Abstract Background Hereditary spastic paraplegia (HSP is a clinically and genetically heterogeneous disorder that can be an autosomal-dominant, autosomal-recessive, or X-linked disease. The most common autosomal-dominant form of the disease derives from mutations in the SPAST gene. Methods The aim of this study was to analyze 49 patients diagnosed with HSP from the Estonian population for sequence variants of the SPAST gene and to describe the associated phenotypes. Healthy control individuals (n = 100 with no family history of HSP were also analyzed. All patient samples were screened using denaturing high performance liquid chromatography (DHPLC and multiplex ligation-dependent probe amplification (MLPA assay. Samples with abnormal DHPLC and MLPA profiles were sequenced, with the same regions sequenced in control samples. Results Sequence variants of SPAST were identified in 19/49 HSP patients (38.8%, twelve among them had pathogenic mutations. Within the latter group there was one sporadic case. Eight patients had pure, and four - complex HSP. The twelve variants were identified: seven pathogenic (c.1174-1G>C, c.1185delA, c.1276C>T, c.1352_1356delGAGAA, c.1378C>A, c.1518_1519insTC, c.1841_1842insA and five non-pathogenic (c.131C>T, c.484G>A, c.685A>G, c.1245+202delG, c.1245+215G>C. Only 2 of these mutations had previously been described (c.131C>T, c.1245+202delG. Three mutations, c.1174-1G>C, c.1276 C>T, c.1378C>A, showed intrafamilial segregation. Conclusion This study identified new variants of the SPAST gene which included benign missense variants and short insertions/deletions. No large rearrangements were found. Based on these data, 7 new pathogenic variants of HSP are associated with clinical phenotypes.

  9. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  10. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  11. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  12. Immediation (Cultures of Immediacy)

    DEFF Research Database (Denmark)

    Kacunko, Slavko

    2018-01-01

    with a complex interplay of social-, security-, science- and economy-related issues. The growing interest in immediation confirms its status as a new but as yet underestimated paradigm for the arts, sciences and humanities which calls for a future-focused inquiry into the cultures of immediacy. However...

  13. Cultural Styles of Persuasion

    Science.gov (United States)

    Glenn, E. S.; And Others

    1977-01-01

    Offers an alternative methodology for studying persuasive strategies by examining the persuasive strategies selected by professional persuaders representing those cultures being studied. Analyzes the persuasive styles of United States, Soviet Union and Arab diplomats involved in international negotiations in the Security Council of the United…

  14. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  16. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  17. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  18. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  19. 1988. aasta suveräänsusdeklaratsioon: silmakirjalikkuse tsiviliseeriv mõju / The Estonian Declaration of Sovereignty: An example of the civilising force of hypocrisy

    Directory of Open Access Journals (Sweden)

    Hent-Raul Kalmo

    2011-01-01

    Full Text Available Sovereignty has been characterised as a form of “organised hypocrisy”, a system governed by a set of rules that are generally recognised as binding and yet continually infringed by the most powerful actors. This idea can be extended to analyse the role of sovereignty within the Soviet Union. The latter was also nominally governed by a constitution which endowed the Union Republics with the right of secession, but there was no realistic possibility of exercising this right. One should not rush to conclude, however, that the letter of the Soviet Constitution of 1977 was entirely without relevance. As Jon Elster has argued, hypocrisy can be a “civilising force” when the need to appear impartial and retain public credibility forces actors to choose a strategy they would not have chosen otherwise. A good example of this kind of argumentative constraint is offered by the dilemma faced by the Soviet leadership after the mid-1980s, as it became reluctant to use military force to suppress independence movements within the Baltic States while, at the same time, promising to give more weight to the Soviet Constitution and respect the “sovereignty” of the Union Republics. In this setting, the ambiguity of the word “sovereignty” could be used by a whole gamut of political movements in order to further their agenda, from local communists eager to expand their autonomy within the Soviet system to those making an explicit bid for the restoration of independence. Significant legal and political changes could be justified as mere conclusions from the constitutionally recognised status of the Union Republics — a strategy which was all the more effective as Moscow struggled to formulate an alternative line of constitutional interpretation that could be used to counter the Baltic claims. This exchange of opinions escalated into a constitutional conflict in November 1988 when the Estonian Supreme Soviet responded to proposed amendments to the Soviet

  20. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  1. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  3. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  4. Emerging need for nuclear security technical and scientific support

    International Nuclear Information System (INIS)

    Kedir, Surur

    2010-01-01

    An effective and efficient nuclear security culture is dependent on proper planning, training, awareness, operation and maintenance. A high level of safety and security culture should be consolidated in the handling of nuclear and radiation sources, so that - inter alia - human errors are minimized through good training; and the concept of safety and security culture was to make it clear that safety should be the highest priority in organization handling nuclear and radiation sources. Regulatory infrastructures for the control of radiation sources should also be supported by governments and be able to act independently. (author)

  5. Client-centeredness of Finnish and Estonian nursing students and the support from nursing education to develop it. Students' self-evaluation.

    Science.gov (United States)

    Kalam-Salminen, Ly; Valkonen, Marjo-Riitta; Aro, Ilme; Routasalo, Pirkko

    2013-10-01

    The purpose of this comparative study is to describe the differences between Finnish and Estonian students evaluations about their client-centeredness and educational support they received to develop it. Client-centeredness has many positive effects on the quality and effectiveness of care. However, some deficiencies have been identified in the client-centeredness of nursing staff. Research on the subject has been limited, and we lack knowledge of graduating students' competence in client-centeredness and the support of their education to develop it. The sample consisted of 390 undergraduate nursing students, 195 from Finland and 195 from Estonia. The data were collected in 2009 using the structured five-point scale questionnaire. The questionnaire was designed to measure students' client-centeredness and the educational support they received from nursing education. The data were analyzed by the PASW Statistics 18-programme using descriptive statistics, Kolmogorov-Smirnov test and Mann-Whitney U-test. Predominantly, students in both countries evaluated their level of client-centeredness high. The Estonian students generally evaluated their client-centeredness higher compared to the Finnish students. The same applied to support provided by nursing education. The greatest differences were related to education and particularly theoretical teaching. In Estonia, students' client-centeredness manifested itself more in politeness and willingness to serve clients, whereas respecting the clients' values was emphasized in Finland. Students' requisites, referred here as knowledge, skills and abilities to implement client-centered nursing, for client-centeredness had deficiencies, and the support from education was also the weakest regarding these aspects. In future, education on development of nursing activities, acquisition of knowledge and services provided by health care as well as legislation should be enhanced, since these areas proved the most difficult for the students

  6. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  7. Ethics issues in security hospitals.

    Science.gov (United States)

    Weinstein, Henry C

    2002-01-01

    The term 'security hospital' is used for a variety of facilities including forensic hospitals and prison hospitals, which, because of their mission, the nature of their work, and the populations they serve-or because of the authority under which they operate-place the staff at considerable risk of ethical violations related to either clinical care or to forensic activities. The problem of divided loyalties is of special concern in security hospitals. Ethics principles particularly at risk are confidentiality and informed consent. Where there are cultural disparities between the staff and the patients, differences in background, socioeconomic class, education, and other types of diversity, cultural awareness is required and must be reflected in appropriate treatment and evaluation. To counteract the risks of ethical violations, a security hospital should create an ethical climate and develop means to anticipate, prevent, and deal with ethical violations. These might include detailed and specific policies and procedures, programs of orientation, education, consultation, and liaison as well as its own ethics committee. Copyright 2002 John Wiley & Sons, Ltd.

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. Ühe (suure kultuurinarratiivi saatus: Noor-Eesti. The Fate of a (Great Cultural Narrative: Young-Estonia

    Directory of Open Access Journals (Sweden)

    Rein Veidemann

    2012-04-01

    Full Text Available This focus of this article is the fate of the cultural narrative that has most influenced Estonian culture of the 20th century – Young Estonia. The point of departure for the analysis is Tiit Hennoste’s 2005 essay ”Young Estonia – An Unfinished Project for Self-Colonization”, which I interpret as the interruption of Young Estonia’s ”great narrative”. Hennoste’s demythologizing approach should be regarded in the context of postmodernism (or of postcolonial treatments of literature and art. I argue that the fact that Young Estonia’s models for cultural movements were located in Europe did not automatically lead to the assimilation of 20th century Estonia (literary culture. Neither did they engage in an automatic copying of European culture; their activities might better be regarded as a process of intertexual enrichment. In what follows, the fate of the narrative of Young Estonia will be traced both in terms of the literary field of Soviet Estonia in the 1950s and 1960s, and in exile. I claim that renewed awareness of the narrative of Young Estonia can be traced to the publication of a collection of Gustav Suits’ Poems in 1959, edited and with an afterword by Endel Sõgel. If one lowers the volume on the vulgar Soviet ideologization in Sõgel’s text, key words that characterize the Young Estonia canon remain in place undisturbed: innovativeness, intellectual greatness, turning point, the social nature of art and literature, consonance of the aesthetic and the ethical. Sõgel’s framing of Young Estonia stands in contrast to its apologetic treatment in the postwar Estonian diaspora. On the one hand, this line of interpretation follows the basic outlines of a critical narrative that developed in the 1920s; on the other, since most of Young Estonia’s authors and followers among the Estonian literary elite had gone into exile in 1944, diaspora interpretations represent a definite literary-political position. In the 1960s a

  10. Ideas towards sustainable water security

    Science.gov (United States)

    Dalin, Carole

    2016-04-01

    With growing global demands and a changing climate, ensuring water security - the access to sufficient, quality water resources for health and livelihoods and an acceptable level of water related risk - is increasingly challenging. While a billion people still lack access to water, over-exploitation of this resource increases in many developed and developing parts of the world. While some solutions to water stress have been known for a long time, financial, cultural and political barriers often prevent their implementations. This talk will highlight three crucial areas that need to be addressed to progress towards sustainable water security. The first point is on scale, the second on the agricultural sector and irrigation, and the third on food trade and policy.

  11. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  12. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  13. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  14. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  15. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  16. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  17. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  18. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  19. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  20. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  1. Transforming Gender and Food Security in the Global South | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-09-29

    Sep 29, 2016 ... It investigates how food security and gender inequity are conceptualized within ... underlying social, cultural, and economic causes of gender inequality. Taken together, these combined approaches enable women and men to ...

  2. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  3. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  4. Nollywood and the Nigerian Security Situation: Prospects and ...

    African Journals Online (AJOL)

    Peace and security are not only variables of national growth and ... culture produced by the Nigerian nation-state the two vital variables remain elusive. ... Case study and content analysis approaches of the qualitative research method were ...

  5. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  6. Asian Educational Discourse: Construction of Ontological Security

    Science.gov (United States)

    Khalina, Natalya V.; Kovaleva, Alla V.; Voronin, Maksim S.; Anikin, Denis V.; Valyulina, Ekaterina V.

    2018-01-01

    This article considers the problem of ontology security through Asian educational discourse, which is structurally determined by the process of moral self-improvement. Considered are trends in improving the management of educational system by developing the culture of quality, which is considered as the next stage of the Asian education systems…

  7. Guidelines for computer security in general practice

    Directory of Open Access Journals (Sweden)

    Peter Schattner

    2007-06-01

    Conclusions This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.

  8. A Holistic and Immune System inspired Security Framework

    OpenAIRE

    Mwakalinga, G. Jeffy; Yngström, Louise; Kowalski, Stewart

    2009-01-01

    This paper presents a Framework for adaptive information security systems for securing information systems. Information systems today are vulnerable and not adaptive to the dynamic environments because initial development of these systems focused on computer technology and communications protocol only. Most research in information security does not consider culture of users, system environments and does not pay enough attention to the enemies of information systems. As a result, users serve t...

  9. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  10. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  11. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  12. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  13. Photonics for safety and security

    CERN Document Server

    Mignani, Anna Grazia; Tajani, Antonella

    2014-01-01

    This volume aims to illustrate the state-of-the-art as well as the newest and latest applications of photonics in safety and security. The contributions from renowned and experienced Italian and international scientists, both from the academic and industrial community, present a multidisciplinary and comprehensive overview of this popular topic. The volume is self-contained and offers a broad survey of the various emerging technologies, as well as their applications in the real world. It spans from applications in cultural heritage, to environment, space, monitoring of coasts, quantum cryptogr

  14. Optimization of airport security lanes

    Science.gov (United States)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  15. Reducing risks to food security from climate change

    DEFF Research Database (Denmark)

    Campbell, Bruce Morgan; Vermeulen, Sonja Joy; Aggarwal, Pramod

    2016-01-01

    , with very little attention paid to more systems components of cropping, let alone other dimensions of food security. Given the serious threats to food security, attention should shift to an action-oriented research agenda, where we see four key challenges: (a) changing the culture of research; (b) deriving...

  16. Rural social security for Zimbabwe: Challenges and opportunities for ...

    African Journals Online (AJOL)

    For them, the remaining sources of livelihood now reside in non-formal social security arrangements anchored upon a staggering cultural base being eroded by the fast encroaching tide of neoliberal individualistic ways of life. Regrettably, government has got no institutional framework to promote non-formal security ...

  17. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  18. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  19. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  20. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  1. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  2. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  3. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  4. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  5. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  6. Corporate Identity as a Factor of Corporate Security

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available Forming-upof the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  7. Corporate identity as a factor of corporate security

    OpenAIRE

    Perelygina, Elena

    2011-01-01

    Forming-up of the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  8. Composition of Estonian atmosphere

    International Nuclear Information System (INIS)

    Punning, J. M.; Karindi, A.

    1996-01-01

    Atmospheric study, particularly that of its chemical composition, has a long tradition in Estonia. Since middle of this century, in addition to meteorological observations, some chemical compounds in precipitations have been regularly measured in many meteorological stations. The main aim was to acquire information about the state and dynamics of the atmosphere. Therefore, main attention was paid to monitoring chemical compounds which have a direct impact on the human environment. As energy production developed intensively and SO 2 and NO x increased drastically in the atmosphere in acidic rock areas, like Scandinavia, the problem of acid rain became the most important environmental problem in Europe and North-America. As a consequence, monitoring the compounds of sulphur in precipitation was organized in Estonia. In the 1970 s, as related to large operating oil shale-based power plants, Estonia became a country , where emissions of sulphur compounds per capita were extremely high. In 1979, Estonia became a participant in the European Monitoring and Evaluation Programme - the network created to study transboundary air pollution. The aims of the precipitation chemistry study and the related problems of the formation and transformation of the atmospheric composition have varied over the years. But monitoring of pollutant (in particular, sulphur compound) loads has been a central issue. Over recent years, an attempt was made to estimate the spatial regularities of atmospheric impurities and their impact on the pH of mean monthly precipitations. Furthermore, calculations were provided to find out the origin of atmospheric impurities washed out in Estonia. Until the 1990 s, CO 2 , and some other greenhouse gas (GHG) emissions were not studied in Estonia. The first inventory of GHG for Estonia was provided in 1995 using the Intergovernmental Panel on Climate Change (IPCC) methodology

  9. Estonian total ozone climatology

    Directory of Open Access Journals (Sweden)

    K. Eerme

    Full Text Available The climatological characteristics of total ozone over Estonia based on the Total Ozone Mapping Spectrometer (TOMS data are discussed. The mean annual cycle during 1979–2000 for the site at 58.3° N and 26.5° E is compiled. The available ground-level data interpolated before TOMS, have been used for trend detection. During the last two decades, the quasi-biennial oscillation (QBO corrected systematic decrease of total ozone from February–April was 3 ± 2.6% per decade. Before 1980, a spring decrease was not detectable. No decreasing trend was found in either the late autumn ozone minimum or in the summer total ozone. The QBO related signal in the spring total ozone has an amplitude of ± 20 DU and phase lag of 20 months. Between 1987–1992, the lagged covariance between the Singapore wind and the studied total ozone was weak. The spring (April–May and summer (June–August total ozone have the best correlation (coefficient 0.7 in the yearly cycle. The correlation between the May and August total ozone is higher than the one between the other summer months. Seasonal power spectra of the total ozone variance show preferred periods with an over 95% significance level. Since 1986, during the winter/spring, the contribution period of 32 days prevails instead of the earlier dominating 26 days. The spectral densities of the periods from 4 days to 2 weeks exhibit high interannual variability.

    Key words. Atmospheric composition and structure (middle atmosphere – composition and chemistry; volcanic effects – Meteorology and atmospheric dynamics (climatology

  10. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  11. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  12. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  13. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  14. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  15. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  16. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  17. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  18. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  19. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  20. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  1. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  3. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  4. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  5. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  6. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  7. Holograms a cultural history

    CERN Document Server

    Johnston, Sean F

    2016-01-01

    Holograms have been in the public eye for over a half-century, but their influences have deeper cultural roots. No other visual experience is quite like interacting with holograms; no other cultural product melds the technological sublime with magic and optimism in quite the same way. As holograms have evolved, they have left their audiences alternately fascinated, bemused, inspired or indifferent. From expressions of high science to countercultural art to consumer security, holograms have represented modernity, magic and materialism. Their most pervasive impact has been to galvanize hopeful technological dreams. This book explores how holograms found a place in distinct cultural settings. Engineers, artists, hippies and hobbyists have played with, and dreamed about, holograms. This book explores the technical attractions and cultural uses of the hologram, how they were shaped by what came before them, and how they have matured to shape our notional futures. Today, holograms are in our pockets (as identity do...

  8. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  9. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  10. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  11. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  12. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  13. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  14. A political culture in exile : the Estonian inter-war generation in Canada and Sweden / Li Bennich-Björkman

    Index Scriptorium Estoniae

    Bennich-Björkman, Li

    2006-01-01

    Uurimuses analüüsitakse institutsionaalsete muutuste mõju poliitilisele kultuurile. Selleks võrreldakse nende esimese Eesti Vabariigi ajal sündinud eestlaste poliitilisi vaateid, kes 1944. aastast alates on elanud Kanadas või Rootsis. Tabelid, diagrammid

  15. Rahvakultuuri tähtsus eesti pagulaste jaoks = The Importance of Folk Culture for Estonian Refugee / Iivi Zájedová, Eha Rüütel

    Index Scriptorium Estoniae

    Zájedová, Iivi, 1955-

    2010-01-01

    Artikkel põhineb uurimistööl väliseestlaste rahvatantsuharrastusest. Rahvatantsurühmade tekkimisest, rahvatantsu osast eestluse säilitamisel väliseestlaste seas. Eesti pagulaste tegevusest ja protsessidest Teise maailmasõja järgsel Saksamaal

  16. The employees' attitudes and their connections with the organisational culture in the process of change in the Estonian organisations / Ruth Alas, Maaja Vadi

    Index Scriptorium Estoniae

    Alas, Ruth, 1960-2018

    2006-01-01

    Eesti ettevõtetes läbi viidud küsitlusuuringu tulemustest selgus, et tugev organisatsioonikultuur on üleminekumajanduse tingimustes suurendanud töötajate valmisolekut muutusteks ning avaldanud positiivset mõju muudatuste läbiviimisele organisatsioonis. Tabelid. Skeemid

  17. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  18. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  19. Guidelines for computer security in general practice.

    Science.gov (United States)

    Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan

    2007-01-01

    As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making

  20. Tõlkelugu ja kultuurimälu / Translation History and Cultural Memory

    Directory of Open Access Journals (Sweden)

    Elin Sütiste

    2012-06-01

    Full Text Available In Estonian culture, the past has value, and efforts are continuously being made to commit to memory that which is considered worth remembering. While there exist a number of histories (national history, literary history, art history, etc., so far no comprehensive and systematic translation history has been written on Estonian culture. At the same time it cannot be said that there is lack of intere st in translation histor y: on the contrar y, many studies have been and are being made in relation to this topic. To use the terminology employed by Aleida Assmann to explain the areas and operation of cultural memory, the recent developments in the attitudes towards translation history in Estonia seem to show that translation history is something that should be remembered and brought out of the archives, transferred from states of passive remembrance and passive forgetting to the sphere of active remembrance.In comparison with many other areas, the idea that a history of translation is something desirable and necessary for a culture is a relatively recent phenomenon; in any case, younger than the idea of the indispensability of literary history, for example. One of the reasons for this may lie in the way translation has been perceived in Western culture and what its relation to ‘original’ literature has been. Susan Bassnett has estimated that the boundary between originals and translations began to be drawn in the seventeenth century, when the idea of an ‘original’ began to acquire currency, and that by the nineteenth century, the status of a translation was generally considered to be lower than that of an ‘original’. This kind of distinction between originals and translations has been noticeable in Estonian culture also, especially since the formation of the influential group “Young Estonia” at the beginning of the 20th century. Additionally, in Estonia as well as in many other countries, literature has been instrumental in shaping