WorldWideScience

Sample records for global security environment

  1. Deterrence and the New Global Security Environment - Lecture note

    International Nuclear Information System (INIS)

    Sitt, Bernard

    2006-01-01

    This lecture note makes an analysis of a collective publication entitled 'Deterrence and the New Global Security Environment', edited by Ian Kenyon and John Simpson (Routledge, New York, 2006). This collection of papers rigorously examines the current place of deterrence in international security relations, delivering the best of contemporary thinking. This is a special issue of the leading journal 'Contemporary Security Policy'. The present Lecture note emphasises a particular deterrence situation mentioned in this publication which is the one involving terrorist actors

  2. Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm

    Science.gov (United States)

    Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid

    2016-01-01

    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques. PMID:27384239

  3. Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm.

    Science.gov (United States)

    Abdulhamid, Shafi'i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid

    2016-01-01

    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.

  4. Securing classification and regulatory approval for deepwater projects: management challenges in a global environment

    Energy Technology Data Exchange (ETDEWEB)

    Feijo, Luiz P.; Burton, Gareth C. [American Bureau of Shipping (ABS), Rio de Janeiro, RJ (Brazil)

    2008-07-01

    As the offshore industry continues to develop and move into increasingly deeper waters, technological boundaries are being pushed to new limits. Along with these advances, the design, fabrication and installation of deepwater oil and gas projects has become an increasingly global endeavor. After providing an overview of the history and role of Classification Societies, this paper reviews the challenges of securing classification and regulatory approval in a global environment. Operational, procedural and technological changes which one Classification Society; the American Bureau of Shipping, known as ABS, has implemented to address these challenges are presented. The result of the changes has been a more customized service aiming at faster and more streamlined classification approval process. (author)

  5. Global Military Operating Environments (GMOE) Phase I: Linking Natural Environments, International Security, and Military Operations

    Science.gov (United States)

    2013-01-30

    diverse range of natural environments and will require that U.S. forces adapt to a wide range of terrain, climate, and associated hazards within these...Synthetic Environment Core Area), baseline terrain information, and application of remote‐sensing technologies for Warfighter and Chameleon . The

  6. Radiation effects on man health, environment, safety, security. Global Chernobyl mapping

    International Nuclear Information System (INIS)

    Bebeshko, V.; Bazyka, D.; Volovik, S.; Loganovsky, K.; Sushko, V.; Siedow, J.; Cohen, H.; Ginsburg, G.; Chao, N.; Chute, J.

    2007-01-01

    Complete text of publication follows. Objectives: Ionizing radiation is a primordial terrestrial and extraterrestrial background and archetypal environmental stress-factor for life origin, evolution, and existence. We all live in radiation world inevitably involving nuclear energy production, nuclear weapon, nuclear navy, radioactive waste, pertinent medical diagnostics and treatment, etc with connected certain probability of relevant accidents and terrorist attack, space and jet travels, high natural background radiation, etc - actual and potential sources of radiation exposures and effects. State-of- the art integral fundamental research on radiation effects on man health, environment, safety, and security (REMHESS) is nowadays paramount necessity and challenge. Methods and results: In given generalized conceptual framework unique 20 years Chernobyl multidimensional research and databases for radiation effects on man's all organism systems represent invaluable original basis and resources for mapping Chernobyl data and REMHESS challenge. Granted by DOE brand new Chernobyl Research and Service Project based on 'Sarcophagus-II' (Object 'Shelter') workers only one in radiation history baseline cohort, corresponding biorepository prospective dynamic data, integrated conceptual database system, and 'state of the art' 'omics' (genomics, proteomics, metabolomics) analysis is designed specifically for coherent addressing global REMHESS problems. In this connection 'Sarcophagus-II' is only one unique universal model. Conclusions: The fundamental goals of novel strategic Project and global Chernobyl mapping are to determine specific 'omics' signatures of radiation for man depending of exposure peculiarity to understand ultimate molecular mechanisms of radiation effects, gene environment interactions, etiology of organisms systems disorders and diseases, and to develop new biomarkers and countermeasures to protect man health in the framework of global REMHESS challenge

  7. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  8. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  9. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  10. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  11. Security Assistance in Nigeria: Shaping the International Environment to Meet U.S. National Security Objectives in the Global Era

    National Research Council Canada - National Science Library

    Prendergast, Kenneth

    2003-01-01

    .... While American interests in Sub-Saharan Africa are significant and growing, there are also important transnational security threats, infectious diseases, organized international criminal activities...

  12. Northern Security and Global Politics

    DEFF Research Database (Denmark)

    This book takes a comprehensive approach to security in the Nordic-Baltic region, studying how this region is affected by developments in the international system. The advent of the new millennium coincided with the return of the High North to the world stage. A number of factors have contributed......-unipolar", indicating a period of flux and of declining US unipolar hegemony. Drawing together contributions from key thinkers in the field, Northern Security and Global Politics explores how this situation has affected the Nordic-Baltic area by addressing two broad sets of questions. First, it examines what impact...... declining unipolarity - with a geopolitical shift to Asia, a reduced role for Europe in United States policy, and a more assertive Russia - will have on regional Nordic-Baltic security. Second, it takes a closer look at how the regional actors respond to these changes in their strategic environment...

  13. Climate Change Implications to the Global Security Environment, U.S. Interests, and Future Naval Operations

    Science.gov (United States)

    2011-03-14

    Central and South America . Reactive HA/DR, on the other hand is a crisis response operation which employs naval expeditionary capabilities to meet...have a wide spectrum of adverse effects on global health, particularly in developing nations. Increased rates and extended ranges of malaria, dengue ...scope of our response when the time comes. " Vice Admiral Richard Truly, Director, Department of Energy National Renewable En ~rgy Lab22 Climate Change

  14. Global Environment Facility |

    Science.gov (United States)

    environment Countries pledge US$4.1 billion to the Global Environment Facility Ringtail lemur mom with two of paradise Nations rally to protect global environment Countries pledge US$4.1 billion to the Global Environment Facility Stockholm, Sweden birds-eye view Events GEF-7 Replenishment Trung Truong Son Landscapes

  15. Secure Environments for Collaboration among Ubiquitous Roaming Entities

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2002-01-01

    SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale ...... and uncertainty of this global computing environment invalidates existing security models. Instead, new security models have to be developed along with new security mechanisms that control access to protected resources.......SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale...

  16. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  17. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  18. GLobal Integrated Design Environment

    Science.gov (United States)

    Kunkel, Matthew; McGuire, Melissa; Smith, David A.; Gefert, Leon P.

    2011-01-01

    The GLobal Integrated Design Environment (GLIDE) is a collaborative engineering application built to resolve the design session issues of real-time passing of data between multiple discipline experts in a collaborative environment. Utilizing Web protocols and multiple programming languages, GLIDE allows engineers to use the applications to which they are accustomed in this case, Excel to send and receive datasets via the Internet to a database-driven Web server. Traditionally, a collaborative design session consists of one or more engineers representing each discipline meeting together in a single location. The discipline leads exchange parameters and iterate through their respective processes to converge on an acceptable dataset. In cases in which the engineers are unable to meet, their parameters are passed via e-mail, telephone, facsimile, or even postal mail. The result of this slow process of data exchange would elongate a design session to weeks or even months. While the iterative process remains in place, software can now exchange parameters securely and efficiently, while at the same time allowing for much more information about a design session to be made available. GLIDE is written in a compilation of several programming languages, including REALbasic, PHP, and Microsoft Visual Basic. GLIDE client installers are available to download for both Microsoft Windows and Macintosh systems. The GLIDE client software is compatible with Microsoft Excel 2000 or later on Windows systems, and with Microsoft Excel X or later on Macintosh systems. GLIDE follows the Client-Server paradigm, transferring encrypted and compressed data via standard Web protocols. Currently, the engineers use Excel as a front end to the GLIDE Client, as many of their custom tools run in Excel.

  19. Global environment and cogeneration

    International Nuclear Information System (INIS)

    Miyahara, Atsushi

    1992-01-01

    The environment problems on global scale have been highlighted in addition to the local problems due to the rapid increase of population, the increase of energy demand and so on. The global environment summit was held in Brazil. Now, global environment problems are the problems for mankind, and their importance seems to increase toward 21st century. In such circumstances, cogeneration can reduce carbon dioxide emission in addition to energy conservation, therefore, attention has been paid as the countermeasure for global environment. The background of global environment problems is explained. As to the effectiveness of cogeneration for global environment, the suitability of city gas to environment, energy conservation, the reduction of carbon dioxide and nitrogen oxides emission are discussed. As for the state of spread of cogeneration, as of March, 1992, those of 2250 MW in terms of power generation capacity have been installed in Japan. It is forecast that cogeneration will increase hereafter. As the future systems of cogeneration, city and industry energy center conception, industrial repowering, multiple house cogeneration and fuel cells are described. (K.I.)

  20. Global Food Security Support Analysis Data (GFSAD) Crop Mask 2010 Global 1 km V001

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Making Earth System Data Records for Use in Research Environments (MEaSUREs) Global Food Security Support Analysis Data (GFSAD) Crop Mask Global 1 kilometer...

  1. Forensic nursing in secure environments.

    Science.gov (United States)

    Shelton, Deborah

    2009-01-01

    There are few well-designed studies of corrections or prison nursing roles. This study seeks to describe the corrections or prison role of forensic nurses in the United States who provide care in secure environments. National data detailing the scope of practice in secure environments are limited. This pencil and paper survey describes the roles of 180 forensic nurses from 14 states who work in secure environments. Descriptive statistics are utilized. A repeated measures ANOVA with post hoc analyses was implemented. These nurses were older than average in age, but had 10 years or less experience in forensic nursing practice. Two significant roles emerged to "promote and implement principles that underpin effective quality and practice" and to "assess, develop, implement, and improve programs of care for individuals." Significant roles varied based upon the security classification of the unit or institution in which the nurses were employed. Access to information about these nurses and their nursing practice was difficult in these closed systems. Minimal data are available nationally, indicating a need for collection of additional data over time to examine changes in role. It is through such developments that forensic nursing provided in secure environments will define its specialization and attract the attention it deserves.

  2. Application Security in the ISO27001 Environment

    CERN Document Server

    Vinod, Vasudevan; Firosh, Ummer

    2008-01-01

    Application Security in the ISO27001 Environment demonstrates how to secure software applications within a best practice ISO/IEC 27001 environment and supports implementation of the PCI DSS Payment Application Security Standard.

  3. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  4. ECONOMIC SECURITY – NEW APPROACHES IN THE CONTEXT OF GLOBALIZATION

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2015-08-01

    Full Text Available Nowadays, more than ever, economic relations between states are the ones that define the general character of the relations between them and establish economic security as a concept which cannot be neglected anymore. Globalization, the process that shapes the international environment, undermines the old definition of economic security and forces its redefinition. The article aims to identify and analyse the effects of globalization on economic security and the new approaches it takes in this context.

  5. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on environment laboratories: Protecting the environment

    International Nuclear Information System (INIS)

    2012-01-01

    According to the Millennium Development Goals, managing the environment is considered an integral part of the global development process. The main purpose of the IAEA's environment laboratories is to provide Member States with reliable information on environmental issues and facilitate decision making on protection of the environment. An increasingly important feature of this work is to assess the impact of climate change on environmental sustainability and natural resources. The IAEA's environment laboratories use nuclear techniques, radionuclides, isotopic tracers and stable isotopes to gain a better understanding of the various marine processes, including locating the sources of pollutants and their fate, their transport pathways and their ultimate accumulation in sediments. Radioisotopes are also used to study bioaccumulation in organisms and the food chain, as well as to track signals of climate change throughout history. Natural and artificial radionuclides are used to track ocean currents in key regions. They are also used to validate models designed to predict the future impact of climate change and ocean acidification. The laboratories study the fate and impact of contamination on a variety of ecosystems in order to provide effective preventative diagnostic and remediation strategies. They enhance the capability of Member States to use nuclear techniques to understand and assess changes in their own terrestrial and atmospheric environments, and adopt suitable and sustainable remediation measures when needed. Since 1995, the IAEA environment laboratories have coordinated the international network of Analytical Laboratories for the Measurement of Environmental Radioactivity, providing accurate analysis in the event of an accident or an intentional release of radioactivity. In addition, the laboratories work alongside other organizations, such as UNESCO, the IOC, UNEP and the EC. The laboratories collaborate with Member States through direct involvement with

  6. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  7. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  8. Japan and the global environment

    International Nuclear Information System (INIS)

    Miller, A.S.; Moore, C.

    1993-01-01

    In many areas, the word most often used to describe Japanese policy is open-quotes enigma.close quotes In some ways, Japan's record on environmental policy also has elements of mystery and contradiction. On the one hand, Japan's history and culture often are associated with a reverence for nature. Indeed, Japan does lead the world in certain environmental areas, such as reduction of conventional air pollutants and compensation of air pollution victims. On the other hand, Japan has been widely criticized for its poor record in preserving its domestic environment, contribution to tropical deforestation, and unwillingness to protect endangered species. Today, the international community clamors for Japan to take its share of responsibility, as an economic superpower, for the global environment. To secure its place in world affairs, Japan slowly has begun to respond to this pressure on issues ranging from ivory importation to reduction of CFC emissions. There is some hope that the government's particular willingness to address global warming may be a sign of significant changes to come in Japanese environmental policy. However, international pressure remains on the many environmental issues Japan has yet to resolve, including tropical deforestation and financing of Third World development projects that harm the environment. Japan's environmental policy is most effective when government and industry cooperate to find technical solutions to environmental problems. Although in recent years Japan's energy consumption has risen sharply, the Japanese have developed numerous technologies to reduce pollution and increase economic growth by improving energy efficiency. It is in these technologies that Japan has made the greatest strides and has the most to offer the global environment

  9. Energy and global environment

    International Nuclear Information System (INIS)

    Fyfe, W.S.; Powell, M.A.

    1991-01-01

    At present about 90% of the world's energy consumption is met by the fossil carbon fuel used in the form of coal, oil and natural gas. This results into release of vast amounts of waste gas CO 2 into the atmosphere posing a threat to the global environment. Moreover this energy source is not sustainable (renewable) and its use amounts to spending Earth's capital resources. The options to this energy source are biomass energy, hydro power, solar energy, geothermal energy and nuclear energy. The potentials, limitations, geological impact and environmental dangers, if any, of these sources are discussed in brief. Energy conservation through energy efficient systems is also one more option. Problems and potential for change to sustainable energy systems with respect to India and Canada are examined. Finally it is pointed out that the ultimate solution to the world's energy problem lies in population control and population reduction. This will make possible for the world to have a sustainable energy system primarily based on solar energy. (M.G.B.). 15 refs

  10. Development and the global environment

    International Nuclear Information System (INIS)

    Colombo, U.

    1992-01-01

    The development of the Third World and the protection of the environment are two major global problems interconnected by energy - the motor of economic growth and the main cause of deterioration of the global environment. They can no longer be separated. The threats of ozone, acid rain, and global warming are global in scope and solutions must involve energy consumption, conservations, and renewable resources. The precept that development should hinge on sound management of natural resources and the environment no longer has merely local or regional significance. It is a global concern and each person should feel a sense of ethical commitment as a world citizen

  11. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  12. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  13. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  14. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  15. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  16. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  17. Designing for the global environment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-31

    This document contains papers which were presented at the symposium entitled Designing for the Global Environment. Session topics included policy and the implementation of energy efficient technologies. Individual papers were processed separately for the Department of Energy databases.

  18. Global climate change and international security

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  19. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  20. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  1. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  2. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  3. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  4. The global environment: An overview

    International Nuclear Information System (INIS)

    Tolba, M.K.

    1992-01-01

    Global environmental chemistry today involves a rapidly expanding need both for new research and for the development of an interdiciplinary approach to the multiplicity of interconnected environmental problems. Every ecosystem shows signs of damage: growing quantities of wastes; decreasing water supplies; soil degradation; coastal zone deterioration; deforestation and climatic change; global warming due to ozone depletion. Solutions must involve a cooperative and holistic global effort in three areas: scientific understanding of how the interactive physical, chemical and biological processes regulate the total Earth system; public policy implications including closer liaison between scientists and policymakers;and understanding of the state of the global environment, what is going wrong, why, and whether it is getting worse

  5. Globalization and protection of environment

    International Nuclear Information System (INIS)

    Panahandeh, M.

    2003-01-01

    In recent years two trends have come into conflict in the international arena. The first is the globalization of economy and the second is the increased public concern over the environmental impact of economic activities and awareness of the global dimensions of many environmental problems. Nowadays confrontation of the issue of globalization and economic liberalization and protect of the environment is a matter of heated debate and environmentalists see globalization posing a threat to environment standards. The effects of liberalization on environment in the developing world have been analyzed from the perspective of the pollution- have hypothesis. The hypothesis suggests that the liberalization encourages a spatial displacement of the so-called d irty o r pollution- intensive industries from the developed countries with stricter environmental regulations to their preferential location in developing countries which enjoy minimal environmental regulations or capacity for environmental monitoring and enforcement. It also suggests that economic policies which promote foreign investment in the natural resources of developing countries will increase rates of natural-resource extraction in the developing world. according to the theory, the translational firms will employ cheep technologies in developing countries which are not environmental sound and no longer permitted to use in the industrialized world

  6. Global economics and the environment

    International Nuclear Information System (INIS)

    Stone, R.D.; Hamilton, E.

    1991-01-01

    The rampant destruction of the rural tropics the earth's most fertile source of life will continue unchecked unless a global bargain can be reached between the capital-rich North and the economically destitute South. This report presents the findings of a colloquium sponsored by the Council on Foreign Relations and the World Resources Institute, and assesses the prospects for a global policy for sustainable growth in the Third World. It reviews how the North constrains the development of such a policy by its actions in the areas of international trade, public and private investment, and debt and recommends new efforts to foster mutual cooperation. It also outlines a series of creative recommendations from the colloquium's international and multidisciplinary panel of experts. Offering an agenda for the June 1992 United Nations Conference on Environment and Development (UNCED), this report sets the stage for one of the most important global challenges of the coming decade

  7. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  8. Operational security in a grid environment

    CERN Document Server

    CERN. Geneva

    2008-01-01

    This talk presents the main goals of computer security in a grid environment, by using a FAQ approach. It details the evolution of the risks in the recent years, likely objectives for attackers and the progress made by the malware toolkits and frameworks. Finally, recommendations to deal with these threats are proposed.

  9. The Global Environment: At a Tipping Point?

    OpenAIRE

    Han, Xueying; Appelbaum, Richard

    2014-01-01

    Overview of the current global environment. Introduction to climate change, global warming, ocean warming and acidification, impacts on both aquatic and terrestrial ecosystems. Lecture used for a Global Studies class.

  10. Global Security, Medical Isotopes, and Nuclear Science

    Science.gov (United States)

    Ahle, Larry

    2007-10-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  11. Global Security, Medical Isotopes, and Nuclear Science

    International Nuclear Information System (INIS)

    Ahle, Larry

    2007-01-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R and D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities

  12. Carbon plants nutrition and global food security

    Science.gov (United States)

    Mariani, Luigi

    2017-02-01

    To evaluate the effects of carbon nutrition on agricultural productivity, a physiological-process-based crop simulation model, driven by the 1961-1990 monthly climate data from global FAO dataset, was developed and applied to four crops (wheat, maize, rice and soybean -WMRS) which account for 64% of the global caloric consumption of humans. Five different temperatures and CO2 scenarios (current; glacial; pre-industrial; future_1 with 560 ppmv for CO2 and +2 °C for temperature; and future_2 with 800 ppmv for CO2 and +4 °C) were investigated. The relative values of WMRS global productions for past and future scenarios were, respectively, 49% of the present-day scenario for glacial, 82% for pre-industrial, 115% for future_1 and 124% for future_2. A sensitive growth of productivity of future scenarios (respectively to 117% and 134%) was observed if the northward shift of crops was allowed, and a strong increase was obtained without water limitation (from 151% to 157% for the five scenarios) and without biotic and abiotic stresses (from 30% to 40% for WMRS subject to the current scenario). Furthermore since the beginning of the Green Revolution (roughly happened between the '30s and the '50s of the twentieth century) production losses due to sub-optimal levels of CO2 and to biotic and abiotic stresses have been masked by the strong technological innovation trend still ongoing, which, in the last century, led to a strong increase in the global crop production (+400%-600%). These results show the crucial relevance of the future choices of research and development in agriculture (genetics, land reclamation, irrigation, plant protection, and so on) to ensure global food security.

  13. Web Server Security on Open Source Environments

    Science.gov (United States)

    Gkoutzelis, Dimitrios X.; Sardis, Manolis S.

    Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.

  14. Global positioning site environment evaluator

    International Nuclear Information System (INIS)

    Leffler, S.; Reeser, H.G.; Zaker, E.; Hansen, W.; Sikorski, R.W.

    1990-01-01

    Development of an innovative, integrated, automated system (Global Positioning Site Environment Evaluator - GPSEETM) for surveying contaminated waste sites is described. This system makes novel use of the Global Positioning System (GPS) satellite constellation for establishing specific locations and current times for surveying radioactive, hazardous, or mixed-waste sites. GPSEE may also be used for waste site contamination surveys after remediation activities to ensure environmental remediation is complete. A base station is established for collecting and recording data and directing field operations for field stations which may be located many miles from the base station. The field operators collect site surveying and contamination data utilizing a variety of chemical and radiological sensors. A major goal for the data collection process is to collect all data utilizing in situ sensors, thereby minimizing the need for collecting soil and water samples. Site contamination data is transmitted electronically to the base station for recording and processing. The GPSEE system is being developed for use at DOE/DOD and a variety of industrial facilities. 3 figs

  15. G-8 leaders tackle global energy security

    International Nuclear Information System (INIS)

    Quevenco, R.

    2006-01-01

    Leaders of the Group of 8 countries backed the IAEA's work at their annual summit held 15-17 July 2006 in St. Petersburg, Russia. A concluding summary statement endorsed IAEA programmes and initiatives in areas of nuclear safety, security, and safeguards. The G8 nations adopted a St. Petersburg Plan of Action to increase transparency, predictability and stability of the global energy markets, improve the investment climate in the energy sector, promote energy efficiency and energy saving, diversify energy mix, ensure physical safety of critical energy infrastructure, reduce energy poverty and address climate change and sustainable development. In a statement on global energy security, the G8 said countries who have or are considering plans for nuclear energy believe it will contribute to global energy security while reducing air pollution and addressing climate change. The G8 said it acknowledged the efforts made in development by the Generation IV International Forum (GIF) and the IAEA's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). GIF and INPRO both bring together countries to develop next generation nuclear energy systems, including small reactors, very high temperature reactors and supercritical water-cooled reactors. The G8 reaffirmed its full commitment to all three pillars of the NPT and called on all States to comply with their NPT obligations, including IAEA safeguards as well as developing effective measures aimed at preventing trafficking in nuclear equipment, technology and materials. The G8 is seeking universal adherence to IAEA comprehensive safeguards agreements and is actively engaged in efforts to make comprehensive safeguards agreements together with an Additional Protocol the universally accepted verification standard. The G8 noted that an expansion of the peaceful use of nuclear energy must be carried forward in a manner consistent with nuclear non-proliferation commitments and standards. It discussed concrete

  16. Robotic security vehicle for exterior environments

    International Nuclear Information System (INIS)

    Klarer, P.R.; Workhoven, R.M.

    1988-01-01

    This paper describes a current effort at Sandia National Labs to develop an outdoor robotic vehicle capable of performing limited security functions autonomously in a structured environment. The present stage of development entails application of algorithms originally developed for the SIR vehicle to a testbed vehicle more appropriate to an outdoor environment. The current effort will culminate in a full scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. Various schemes for implementation of the robot system are discussed, as are plans for further development of the system

  17. Climate change impacts on global food security.

    Science.gov (United States)

    Wheeler, Tim; von Braun, Joachim

    2013-08-02

    Climate change could potentially interrupt progress toward a world without hunger. A robust and coherent global pattern is discernible of the impacts of climate change on crop productivity that could have consequences for food availability. The stability of whole food systems may be at risk under climate change because of short-term variability in supply. However, the potential impact is less clear at regional scales, but it is likely that climate variability and change will exacerbate food insecurity in areas currently vulnerable to hunger and undernutrition. Likewise, it can be anticipated that food access and utilization will be affected indirectly via collateral effects on household and individual incomes, and food utilization could be impaired by loss of access to drinking water and damage to health. The evidence supports the need for considerable investment in adaptation and mitigation actions toward a "climate-smart food system" that is more resilient to climate change influences on food security.

  18. Using Trust for Secure Collaboration in Uncertain Environments

    DEFF Research Database (Denmark)

    Cahill, Vinny; Gray, Elizabeth; Seigneur, Jean-Marc

    2003-01-01

    The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.......The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration....

  19. Student Dissertation Explores Privatization of Global Security

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2012-01-01

    NPS national security affairs doctoral student Cmdr. Dan Straub weighs the benefits and challenges of using private security contractors for United Nations peacekeeping efforts in his upcoming dissertation.

  20. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  1. Globalization Crisis and National Security: A Reflection on Nigeria ...

    African Journals Online (AJOL)

    Globalization Crisis and National Security: A Reflection on Nigeria Textile Industry. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... Thus, while globalization has several palpable positive effects on the countrys industrial growth, it also ...

  2. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  3. Climate resilient crops for improving global food security and safety.

    Science.gov (United States)

    Dhankher, Om Parkash; Foyer, Christine H

    2018-05-01

    Food security and the protection of the environment are urgent issues for global society, particularly with the uncertainties of climate change. Changing climate is predicted to have a wide range of negative impacts on plant physiology metabolism, soil fertility and carbon sequestration, microbial activity and diversity that will limit plant growth and productivity, and ultimately food production. Ensuring global food security and food safety will require an intensive research effort across the food chain, starting with crop production and the nutritional quality of the food products. Much uncertainty remains concerning the resilience of plants, soils, and associated microbes to climate change. Intensive efforts are currently underway to improve crop yields with lower input requirements and enhance the sustainability of yield through improved biotic and abiotic stress tolerance traits. In addition, significant efforts are focused on gaining a better understanding of the root/soil interface and associated microbiomes, as well as enhancing soil properties. © 2018 The Authors Plant, Cell & Environment Published by John Wiley & Sons Ltd.

  4. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Gender and Food Security in the Global South. Page couverture du livre: Transforming Gender and Food Security in the Global South. Directeur(s):. Jemimah Njuki, John R. Parkins et Amy Kaler. Maison(s) d'édition: Routledge, CRDI. 29 septembre 2016. ISBN : 9781138680418. 312 pages. e-ISBN :.

  5. Secure vendor environment (SVE) for PACS

    Science.gov (United States)

    Honeyman-Buck, Janice; Frost, Meryll

    2005-04-01

    A Secure Vendor Environment (SVE) was created to protect radiology modalities from network intrusion, worms, viruses, and other forms of damaging attacks. Many vendors do not attempt any form of network security and if an institution demands a non-standard and secure installation, a future system upgrade could and frequently does eliminate any security measures installed during the initial installation. The SVE isolates the vendor equipment behind a virtual firewall on a private network that is invisible to the outside world. All interactions must go though a device containing two network interface cards called an Application Processor that acts as a store-and forward router, performs DICOM repair, proxies modality worklist, and isolates the vendor modalities. A small VPN appliance can open the device temporarily for remote access by vendor engineers. Prior to the routine installation of the SVE, vendor equipment was often attacked by hostile network intruders and viruses or worms, sometimes rendering the equipment unusable until the vendor could reload the system. The resulted in considerable clinical downtime and loss of revenue. Since the relatively low cost SVE solution has routinely been installed with all new equipment, no intrusions have occurred, although our network sniffers and intrusion detectors indicate that we are constantly being scanned for vulnerability. Purpose: To provide a secure network for vendor equipment in a PACS environment while allowing vendor access for upgrades and system repairs. Method: The network administrators at our university believe that network security should be implemented at the machine level rather than relying on a firewall. A firewall solution could conceivably block unwanted intrusion from outside the university network, but would still allow literally thousands of potential network users to get through to the PACS network. All the PACS archive, display and routing systems are individually protected from intrusion, but

  6. THE NEW GLOBAL ECONOMIC ENVIRONMENT

    OpenAIRE

    Oksay, Suna; Oksay, M. Serhan

    2015-01-01

    Globalization has emerged as an unavoidable process. Its impact upon different levels create different results. Therefore, the effects- of globalization on the world, on countries, on industries, and on firms must be examined separately. The principal worldwide effect of globalization is the increase in the volume of world trade. Its effects on countries have become apparent through the process of deregulation and the elimination of obstacles to trade, etc. At the industrial level, it creates...

  7. Maritime Security – The Need for a Global Agreement

    OpenAIRE

    Dinos Stasinopoulos

    2003-01-01

    This note reviews US maritime security measures, outlines work carried out by international organisations and then frames maritime security within the wider context of maritime trade. Finally, it suggests the development of a Global Agreement linking security and other maritime trade-related issues. The initiative for such an agreement should be undertaken by the EU only if current International Maritime Organisation (IMO) efforts fail to produce a maritime security framework with binding req...

  8. Global Security Contingency Fund: Summary and Issue Overview

    Science.gov (United States)

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  9. Environment and homeland security in France

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2011-01-01

    The author comments the impact of extreme events related to global warming and climate change on the French homeland security. He comments the evolution of temperature during the last century, the various transformations notably predicted by IPCC reports, and the various climate evolutions. Then, he discusses impacts of climate change on different economic sectors. He notably addresses the impact on coast lines (risks of submersion and erosion, more particularly for overseas territories), the impact extreme events may have on soft water (a temperature rise would impact the operation of nuclear plants; sewage and water networks will be threatened by more intense rainfalls), the positive and negative impacts on forests (high productivity but loss of diversity, development of parasites, risks of forest fires), and the impacts on various economic activities (agriculture, food supply, tourism, insurance) and on health

  10. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  11. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  12. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  13. Global environment and radiation exposure

    International Nuclear Information System (INIS)

    Okamoto, Kazuto

    1991-01-01

    The present status of investigation of acid rain, stratospheric ozone depletion and greenhouse effect and their relations to radiation exposure are reported. Soil acidification increases transfer rates of radioactivities to plants which increases the population dose. There are two types of ozone depletion, conventional type and ozone hole type and the latter is much more serious than the former. In the greenhouse effect, although there are large uncertainties both in theoretical and observational sides, present predictions about the global warming will not be very far from reality. Environmental effects are wide-ranging and serious. Radon and thoron exhalation rates are affected by the global warming. The influence of the greenhouse effect on ozone depletion is to suppress depletion for conventional type and enhance depletion for ozone hole type. (author) 65 refs

  14. Security controls in a Cullinet database environment

    International Nuclear Information System (INIS)

    Thompson, R.E.

    1988-01-01

    Security controls using Cullinet's Integrated Data Management System (IDMS) are examined. IDMS software integrity problems, with emphasis on security package interfaces, are disclosed. Solutions applied at Sandia Laboratories Engineering Information Management computing facilty are presented. An overall IDMS computer security philosophy is reviewed

  15. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    .... However, heightened awareness of terrorism has redefined supply-chain security-the consequences of an attack on or via a critical global port could be a tremendous loss of life and a crippling of the U.S...

  16. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  17. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  18. Security environment and nuclear proliferation problems in East Asia

    International Nuclear Information System (INIS)

    Suh, Mark Byung-Moon

    1997-01-01

    East Asia was and still is divided into two conflicting ideological blocs. Because of the Cold War between these two blocs, two international wars were fought and tensions limited interactions among these countries. Despite these political constraints, in recent years East Asia has become economically one of the most dynamic regions in the world. Now that the Cold War between the USA and the Soviet Union is over, the danger of global nuclear war involving the nuclear powers in the region has been practically eliminated. Nonetheless, security has become more complex and demands a whole new set of arrangements. Yet the region lacks a cohesive multilateral framework for conflict resolution, and only recently have various attempts been made to create a political forum for the countries in the region. The problem and the danger of nuclear proliferation was vividly shown by the North Korean nuclear crisis in the last years. This issue not only halted the fragile process of normalization between the two Koreas, which started in 1988, but almost led to a new military conflict on the peninsula involving the two Koreas and the USA. It was defused only after the USA proved willing to offer security guarantees to North Korea. This problem still needs to be resolved, and it demands radical changes in the overall political environment in the region. Needless to say, proliferation in North Korea would have entailed grave consequences for the security of the region as well as for the international non-proliferation regime. This paper reviews the issue of nuclear proliferation of the three non-nuclear states in the region and deals with the non-introduction of nuclear weapons in the region by the nuclear powers. It discusses the prospects for a nuclear-weapon-free zone on the Korean peninsula. Perspectives of a sustainable security environment in East Asia will be briefly discussed

  19. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  20. Population, environment and security: a new trinity.

    Science.gov (United States)

    Hartmann, B

    1998-10-01

    This paper critically examines the literature on the interaction between population, the environment, and development. It posits that population pressure and resource scarcities are unfairly blamed for internal conflicts in Africa, Asia, and Latin America. Internal conflicts are, in fact, affected by underlying economic and political causes (international companies, development assistance agencies, and military). This reasoning implies that the national security threats are environmental groups, poor women, and social change groups, which in fact should be integrated within solutions to poverty, environmental destruction, and violence. The US military's focus on "neutralizing environmental consequences that could lead to instability" and promoting sustainable development is misspecified and falls within the domain of civilian agencies. Use of military satellites by the US Central Intelligence Agency in environmental surveillance raises questions about the management of secret archives. The scarcity-conflict model has an indirect role in misshaping public opinion, legitimizes population control as a top priority, neglects gender issues, and dehumanizes refugees. Evidence indicates that the conflicts in Rwanda were the result of institutional failure and ethnic divisions. Homer-Dixon's model fails due to weak definitions of scarcity, ignorance of the role of colonial history and economic inequities, idealized views of the state, and neglect of external factors. The scarcity-conflict model is popular due to opportunism and political pragmatism. For the military, it provides new rationales for a huge budget.

  1. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  2. Global Banking System Regulatory Environment

    Directory of Open Access Journals (Sweden)

    Oleh Mozhovyi

    2017-03-01

    Full Text Available The international and domestic experience shows that the main factors of financial destabilization during the financial crises are in the banking sector. The article reveals that the vulnerability of the financial system is connected with functions, deposit and credit transactions, risks distribution and ensuring liquidity; banks act as a major factor in stabilisation measures in the current context of globalization processes, since the economic stability of banking activities relates directly to all the entities and only stable banking system can withstand the crisis phenomena. Therefore, as a result of the analysis, it is proved that not only reduction of risks of banks is needed, but also introduction of the effective supervision system over implementation of the requirements and standards to prevent these risks. According to modern international approaches, banks use the so-called prudential supervision, which is based on the risk management assessment policy on the part of the Bank’s management, and regulatory bodies contribute to implementation of such policy. The authors have concluded that not only modern specificity of banks, but also the impact of supervision systems and regulation of modern trends in development of the banking should be analysed. Application of the general regulatory principles and banking risks methodology is required. The task of supervision is distribution of reliable risk management practices in the banking system, taking into account national peculiarities of development.

  3. Neither International nor Global: Rethinking the Problematic Subject of Security

    Directory of Open Access Journals (Sweden)

    David Chandler

    2010-09-01

    Full Text Available This paper argues that the problematic of the international and the global has been a barrier to understanding the transformation of security discourse over the last decade. Academic treatments of security within the discipline of international relations have been structured by the traditional liberal binaries, which conceive of political communities capable of constituting securing subjects at either the level of the state or the global. Today’s dominant framing of the security problematic seems to evade easy articulation within this structure and in some readings is seen to presage a transitory stage from the international to the global. An alternative reading is sketched out here, that of the post- liberal, which suggests that the apparent shift towards the global can not be captured from within the liberal problematic and highlights that rather than traditional disagreements over the nature of the subject of security – the constitution of the securing actor – we are witnessing the disappearance of securing agency itself.

  4. Managing security in an e-business environment

    OpenAIRE

    Davcev, Ljupco

    2009-01-01

    Technological developments over the past few years have made significant contributions to securing the Internet for e-business. Ensuring security for e-business information exchange is essential as it entails exchange of sensitive information. E-business transactions entail transfer of funds with buyers, sellers and business partners. Vulnerabilities and security incidents in the digital environment require an understanding of technology issues and security challenges for privacy and trust...

  5. Food Security: Selected Global and U.S. Resources

    Science.gov (United States)

    Kocher, Megan

    2015-01-01

    Food security is researched and dealt with on local, regional, national, and global levels with solutions ranging from local farmers' market initiatives to increasing crop yields through genetically modified plants to streamlining global supply chains. Because of its broad, interdisciplinary nature, it is necessary to narrow the focus of this…

  6. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  7. EU Contribution to Global CBRN Security

    OpenAIRE

    GOULART DE MEDEIROS MARGARIDA; ABOUSAHL SAID; MAIER EDDIE; SIMONART TRISTAN; DUPRE BRUNO

    2016-01-01

    The EU promotes a culture of CBRN safety and security within the EU and internationally. Accordingly, the Instrument Contributing to Stability and Peace (IcSP) contributes to international efforts to mitigate CBRN risks, whether of natural (e.g. pandemics, volcanic eruptions), accidental (Fukushima) or criminal (trafficking, terrorism) origin, following a consistent ‘all hazards’ approach. The aim is twofold: to prevent CBRN incidents and to build partner countries' capacities for emergency r...

  8. Explaining Global Secularity: Existential Security or Education?

    Directory of Open Access Journals (Sweden)

    Claude M. J. Braun

    2012-11-01

    Full Text Available At the time of data analysis for this report there were 193 countries in the world. Various institutions – the United Nations, the World Health Organization, the CIA, the World Values Survey, Gallup, and many others – have performed sophisticated statistical analyses on cross-national data. The present investigation demonstrates that valid and reliable data concerning religiosity and secularity exist for most countries and that these data are comparable. Cross-national data relating to social, political, economic and cultural aspects of life were tested for correlation with religiosity/secularity. In contrast to the most widely accepted general account of secularity, the Existential Security Framework (ESF; Norris & Inglehart, 2004, secularity was not most highly related to material security, though these were highly related. Rather, secularity was most strongly related to the degree of formal education attained. Material security explained no significant variance beyond education. Thus, religion’s primary function in the world today is being replaced, not so much by the pseudo-materialistic supplication for better living conditions as posited by the ESF, but by contemporary education – extensive knowledge of contemporary cultures, philosophy, modes of thought or processes of reasoning.

  9. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  10. Security in cloud computing and virtual environments

    OpenAIRE

    Aarseth, Raymond

    2015-01-01

    Cloud computing is a big buzzwords today. Just watch the commercials on TV and I can promise that you will hear the word cloud service at least once. With the growth of cloud technology steadily rising, and everything from cellphones to cars connected to the cloud, how secure is cloud technology? What are the caveats of using cloud technology? And how does it all work? This thesis will discuss cloud security and the underlying technology called Virtualization to ...

  11. Global Energy Security and Its Geopolitical Impediments: The Case of the Caspian Region

    NARCIS (Netherlands)

    Amineh, M.P.; Houweling, H.

    2007-01-01

    This article discusses the global geopolitics of energy security in the post-Cold War environment. Energy companies headquartered in western countries have long history of accessing energy resources beyond borders through invasion of the host by their home state, followed by domination and the

  12. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  13. Global plutonium management: A security option

    International Nuclear Information System (INIS)

    Sylvester, K.W.B.

    1998-01-01

    The US surplus plutonium disposition program was created to reduce the proliferation risk posed by the fissile material from thousands of retired nuclear weapons. The Department of Energy has decided to process its Put into a form as secure as Pu in civilian spent fuel. While implementation issues have been considered, a major one (Russian reciprocity) remains unresolved. Russia has made disposition action conditional on extracting the fuel value of its Pu but lacks the infrastructure to do so. Assistance in the construction of the required facilities would conflict with official US policy opposing the development of a Pu fuel cycle. The resulting stagnation provides impetus for a reevaluation of US nonproliferation objectives and Pu disposition options. A strategy for satisfying Russian fuel value concerns and reducing the proliferation risk posed by surplus weapons-grade plutonium (WGPu) is proposed. The effectiveness of material alteration (e.g., isotopic, chemical, etc.hor-ellipsis) at reducing the desire, ability and opportunity for proliferation is assessed. Virtually all the security benefits attainable by material processing can be obtained by immobilizing Pu in large unit size/mass monoliths without a radiation barrier. Russia would be allowed to extract the Pu at a future date for use as fuel in a verifiable manner. Remote tracking capability, if proven feasible, would further improve safeguarding capability. As an alternate approach, the US could compensate Russia for its Pu, allowing it to be disposed of or processed elsewhere. A market based method for pricing Pu is proposed. Surplus Pu could represent access to nuclear fuel at a fixed price at a future date. This position can be replicated in the uranium market and priced using derivative theory. The proposed strategy attempts to meet nonproliferation objectives by recognizing technical limitations and satisfying political constraints

  14. Urban environment and health: food security.

    Science.gov (United States)

    Galal, Osman; Corroon, Meghan; Tirado, Cristina

    2010-07-01

    The authors examine the impact of urbanization on food security and human health in the Middle East. Within-urban-population disparities in food security represent one of the most dramatic indicators of economic and health disparities. These disparities are reflected in a double burden of health outcomes: increasing levels of chronic disease as well as growing numbers of undernourished among the urban poor. These require further comprehensive solutions. Some of the factors leading to food insecurity are an overdependence on purchased food commodities, lack of sufficient livelihoods, rapid reductions in peripheral agricultural land, and adverse impacts of climate change. The Food and Agriculture Organization of the United Nations (FAO) Food Security Framework is used to examine and compare 2 cities in the Middle East: Amman, Jordan, and Manama, Bahrain.

  15. Global Climate Change: National Security Implications

    Science.gov (United States)

    2008-05-01

    it cost to treat asthma in children and other health problems caused by the dirt we were putting out of the smokestacks. It was passed by the...in Latin America for a number of years. General Clark used to say, “In SOUTHCOM, take no credit and expect none.” And I think that was a good rule...damage the health of our children .35 People also need to better understand the implications of globalization. Not all currently appreciate how our

  16. Fairtrade, Food Security and Globalization: Building Alternative Food Systems

    Directory of Open Access Journals (Sweden)

    Martin Calisto Friant

    2016-05-01

    Full Text Available This article examines the politics and practices of Fairtrade certification in order to assess whether this alternative trading system could contribute to innovative solutions for global food security. The analysis begins by assessing the main challenges and problems characterizing the contemporary global food system. It then explores the history, vision and certification standards of the Fairtrade label. In the third section, the results of the impact studies of Fairtrade certification on producer livelihoods are discussed, analyzing the various strengths and weaknesses. Finally the article analyzes whether, and how, the Fairtrade system could positively contribute to improving global food security. To conclude this paper argues that the greatest strength of Fairtrate is not the certification mechanism itself but rather the social and environmental principles it represents. Fairtrade standards could serve to inform broader international policies, which could lead to a sustainable transformation of the global food system.

  17. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  18. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  19. Just Security and the Crisis of Global Governance

    OpenAIRE

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade into others. Managing them so as to avoid such failures is an essential function of global governance. Public space is the home of governance (formal and informal) and of rights-exercising groups and ...

  20. China's mineral resources security under economic globalization

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y. [China University of Mining and Technology, Xuzhou (China). College of Environment and Spatial Informatics

    2002-10-01

    The concept and intention of mineral resources security are introduced. From the insurance and leverage that mineral resources has on China's socio-economic development, the strength of support, the opportunity and challenge imposed by globalised economy, the effect of mineral resource development on the safety of the eco-environment, the author analyses the basic situation and existing problem of the mineral resources security in China; summarizes the current research situation of mineral resources security and the main tactics which are used to ensure mineral resources security in the developed countries; presents the essence of mineral resources security, the basic principles of research and the problems focused; and points out the research areas and goals that should be strengthened urgently. 15 refs.

  1. Secure Web System in a Cloud Environment

    OpenAIRE

    Pokherl, Bibesh

    2013-01-01

    Advent of cloud computing has brought a lot of benefits for users based on its essential characteristics. Users are attracted by its costs per use service and rapidly deploy their applications in the cloud and scale by using virtualization technology without investing in their own IT infrastructure. These applications can be accessed through web based technology, such as web browsers or mobile apps. However, security becomes a major challenge when user’s data and applications are stored in a ...

  2. Epilogue: global food security, rhetoric, and the sustainable intensification debate

    NARCIS (Netherlands)

    Kuijper, T.W.M.; Struik, P.C.

    2014-01-01

    The need to feed nine billion people in 2050 has given rise to widespread debate in science and policy circles. The debate is largely framed in neo-Malthusian terms, and elements of global food security (resilience of the food system, food quantity and quality, right to and access to food) demand

  3. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  4. Just Security and the Crisis of Global Governance

    NARCIS (Netherlands)

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade

  5. Conducting network penetration and espionage in a global environment

    CERN Document Server

    Middleton, Bruce

    2014-01-01

    When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wi

  6. Global energy security and the implications for the EU

    International Nuclear Information System (INIS)

    Umbach, Frank

    2010-01-01

    The following article will analyse the global and geopolitical dimensions of the future international energy security and its implications for Europe and the EU-27. In this context, I will discuss to which extent the EU's newly proclaimed 'Energy Action Plan' of the EU Spring summit of 2007 and its declared common energy (foreign) policy are a sufficient strategy to cope with the new global and geopolitical challenges. The article concludes the following: (1) The interlinkage between globally designed traditional energy security concepts - that rely just on economic factors and 'market-strategies' - and domestic as well as regional political stability demands new thinking with regard to both energy supply security and foreign and security policies. (2) Although after the Russian-Ukrainian gas conflict in January 2006, energy security has forced its way up the European energy and foreign policy agendas, the EU-27 member states have largely failed to forge a coherent European energy security and energy foreign policy strategy after their Spring summit of 2007 because its declared political solidarity has been still lacking. But the 2nd Strategic Energy Review of November 2008 has recommended new initiatives to overcome this lack by promoting concrete infrastructure and other projects for enhancing Europe's supply security and its political solidarity as part of a common energy (foreign) policy. If the EU is able to implement the March 2007 and November 2008 decisions, the EU oil and gas demand will drastically reduce and freeze at current levels. In this case, Putin's energy policies by using Russia's energy resources and pipeline monopolies as a political instrument to enforce its economic and geopolitical interests will be proved as self-defeating in Russia's long-term strategic interests. It will reduce Gazprom's gas exports to a much smaller EU gas market than originally forecasted as the result of a deliberate EU policy of decreasing its overall gas demand and

  7. Globally reasoning about localised security policies in distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax......, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access...... control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative...

  8. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Naughton, III, Thomas J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  9. The Transformation of Security Environment at the beginning of XXIst Century

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2009-06-01

    Full Text Available The current security environment is characterized by a high degree of instability andunpredictability, by the manifestation of new risks and threats, by redefining relations between thegreat powers and increased freedom of action of regional factors. The evolution of global security inthe last decade, has confirmed that the success of actions and the stability can only be the result of amultidimensional cooperation of the international community, through emphasizing the dialogue in aninstitutional framework and activating the decisive role that the great international organizations playin defining the state of security of the world.

  10. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  11. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  12. Radiations in space and global environment

    International Nuclear Information System (INIS)

    Oguti, Takasi

    1994-01-01

    It has been well known that the global environment of the earth is basically determined by the radiation equilibrium of the earth atmosphere system embedded in the solar radiation. However, the surface temperature of about 15 degC on average is much higher than that determined by the radiation equilibrium. This is due to the so-called greenhouse gases in the atmosphere such as carbon dioxide, water vapor, methane and others. Also the global environment has evolved by interacting with the living things on the earth, for example, tree oxygen by photosynthesis, and a small amount of ozone protecting living things from the fetal damage due to solar ultraviolet radiation. The solar radiation of short wavelength, that is, ultraviolet to X-ray influences atmospheric constituents, and the thermal structure and dynamics of the atmosphere through chemical reaction. The solar energetic particles produced by solar flares precipitate in the polar regions, and the nitric oxides are produced by auroral X-ray. Auroral activities accelerate particles in the magnetosphere. All these radiations cause significant global changes. Human activities increase greenhouse gases rapidly and cause global warming, and atmospheric chloro-fluoro-carbon (CFC) makes the ozone hole. Now, human activities must be modified to match the natural cycle of materials. (K.I.)

  13. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  14. Web Syndication in a Multilevel Security Environment

    Science.gov (United States)

    2012-03-01

    Group LAMP Linux, Apache, MySQL and PHP LAN Local Area Network MAC Mandatory Access Control MILS Multiple Independent Levels of Security MLS Multilevel...Reader [35] Section 1.4.3 – X X X X X FeedShow [36] Section 1.4.3 – X X X X feed on feeds [37] Section 1.4.3 GPL PHP 4.3.2+, MySQL – X X / Tiny Tiny RSS...38] Section 1.4.3 GPL PHP 5+, MySQL /Postgres – X X X X – zFeeder [39] Section 1.4.3 GPL PHP 4.2+ – X X – / lylina [40] Section 1.4.3 GPL PHP 5.2

  15. Global Food Security Governance: Civil Society Engagement in the Reformed Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.

    2015-01-01

    In 2007/8 world food prices spiked and global economic crisis set in, leaving hundreds of millions of people unable to access adequate food. The international reaction was swift. In a bid for leadership, the 123 member countries of the United Nations’ Committee on World Food Security (CFS) adopted a

  16. PERSPECTIVE: Climate change, biofuels, and global food security

    Science.gov (United States)

    Cassman, Kenneth G.

    2007-03-01

    There is a new urgency to improve the accuracy of predicting climate change impact on crop yields because the balance between food supply and demand is shifting abruptly from surplus to deficit. This reversal is being driven by a rapid rise in petroleum prices and, in response, a massive global expansion of biofuel production from maize, oilseed, and sugar crops. Soon the price of these commodities will be determined by their value as feedstock for biofuel rather than their importance as human food or livestock feed [1]. The expectation that petroleum prices will remain high and supportive government policies in several major crop producing countries are providing strong momentum for continued expansion of biofuel production capacity and the associated pressures on global food supply. Farmers in countries that account for a majority of the world's biofuel crop production will enjoy the promise of markedly higher commodity prices and incomesNote1. In contrast, urban and rural poor in food-importing countries will pay much higher prices for basic food staples and there will be less grain available for humanitarian aid. For example, the developing countries of Africa import about 10 MMt of maize each year; another 3 5 MMt of cereal grains are provided as humanitarian aid (figure 1). In a world where more than 800 million are already undernourished and the demand for crop commodities may soon exceed supply, alleviating hunger will no longer be solely a matter of poverty alleviation and more equitable food distribution, which has been the situation for the past thirty years. Instead, food security will also depend on accelerating the rate of gain in crop yields and food production capacity at both local and global scales. Maize imports and cereal donations as humanitarian aid to the developing countries of Africa Figure 1. Maize imports (yellow bar) and cereal donations as humanitarian aid to the developing countries of Africa, 2001 2003. MMT = million metric tons. Data

  17. IMIRSEL: a secure music retrieval testing environment

    Science.gov (United States)

    Downie, John S.

    2004-10-01

    The Music Information Retrieval (MIR) and Music Digital Library (MDL) research communities have long noted the need for formal evaluation mechanisms. Issues concerning the unavailability of freely-available music materials have greatly hindered the creation of standardized test collections with which these communities could scientifically assess the strengths and weaknesses of their various music retrieval techniques. The International Music Information Retrieval Systems Evaluation Laboratory (IMIRSEL) is being developed at the University of Illinois at Urbana-Champaign (UIUC) specifically to overcome this hindrance to the scientific evaluation of MIR/MDL systems. Together with its subsidiary Human Use of Music Information Retrieval Systems (HUMIRS) project, IMIRSEL will allow MIR/MDL researchers access to the standardized large-scale collection of copyright-sensitive music materials and standardized test queries being housed at UIUC's National Center for Supercomputing Applications (NCSA). Virtual Research Labs (VRL), based upon NCSA's Data-to-Knowledge (D2K) tool set, are being developed through which MIR/MDL researchers will interact with the music materials under a "trusted code" security model.

  18. A Secure Authenticate Framework for Cloud Computing Environment

    OpenAIRE

    Nitin Nagar; Pradeep k. Jatav

    2014-01-01

    Cloud computing has an important aspect for the companies to build and deploy their infrastructure and application. Data Storage service in the cloud computing is easy as compare to the other data storage services. At the same time, cloud security in the cloud environment is challenging task. Security issues ranging from missing system configuration, lack of proper updates, or unwise user actions from remote data storage. It can expose user’s private data and information to unwanted access. i...

  19. Shift work in a security environment

    International Nuclear Information System (INIS)

    Longhouser, G.A. Jr.

    1993-01-01

    Human beings are diurnal species, normally active by day and asleep by night. Yet over thirty million Americans struggle with work schedules that include an off-normal work effort. The railroads, law enforcement, health services, Department of Defense, factory workers, chemical plants and public services, communications and utility workers must provide some form of around-the-clock effort. Shift work has been around since the advent of recorded history. There has always been a need for some type of off-normal service and assistance. The impact of shift work is replete with tales and factual evidence of an increased personnel error rate; disorders, both personal and family, and of course, increased accident events. In recent memory, the Three Mile Island Nuclear Plant incident, Union Carbide's explosion in Bhopal, and the Chernobyl Nuclear Plant catastrophe all occurred during off-normal working hours. Yet management overall has done little to correct the production-driven twelve hour, seven day week shift mentality of the nineteenth century. Most schedules in use today are nothing more than cosmetic variations of the old production schedules. This could be driven by a management consideration of the worker's response to change coupled with a reluctant buy-in of responsibility for the effects of change. Florida Power Corporation has developed for its nuclear security force, a unique work schedule which attempts to employ the sound principles of circadian rhythms coupled with a comprehensive training program to counter the problems associated with shift work. The results over the last four years have seen a marked reduction in the generic problems of personnel errors, absenteeism, unscheduled overtime and turnover rates. Utilization and understanding of this scheduling process for rotational shift work needs to be assessed to determine if the benefits are site specific or provide an expected response to the problems of shift work

  20. International conference on nuclear security: Global directions for the future. Contributed papers

    International Nuclear Information System (INIS)

    2005-01-01

    This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress

  1. International conference on nuclear security: Global directions for the future. Contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress.

  2. Security risks associated with radio frequency identification in medical environments.

    Science.gov (United States)

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  3. A secure medical data exchange protocol based on cloud environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn

    2014-09-01

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

  4. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    International Nuclear Information System (INIS)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante

    2017-01-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  5. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante, E-mail: barreto@unifor.br, E-mail: midredcb@hotmail.com [Universidade de Fortaleza (UNIFOR), CE (Brazil)

    2017-07-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  6. Global health security and the International Health Regulations

    Directory of Open Access Journals (Sweden)

    Oliva Otavio

    2010-12-01

    Full Text Available Abstract Global nuclear proliferation, bioterrorism, and emerging infections have challenged national capacities to achieve and maintain global security. Over the last century, emerging infectious disease threats resulted in the development of the preliminary versions of the International Health Regulations (IHR of the World Health Organization (WHO. The current HR(2005 contain major differences compared to earlier versions, including: substantial shifts from containment at the border to containment at the source of the event; shifts from a rather small disease list (smallpox, plague, cholera, and yellow fever required to be reported, to all public health threats; and shifts from preset measures to tailored responses with more flexibility to deal with the local situations on the ground. The new IHR(2005 call for accountability. They also call for strengthened national capacity for surveillance and control; prevention, alert, and response to international public health emergencies beyond the traditional short list of required reporting; global partnership and collaboration; and human rights, obligations, accountability, and procedures of monitoring. Under these evolved regulations, as well as other measures, such as the Revolving Fund for vaccine procurement of the Pan American Health Organization (PAHO, global health security could be maintained in the response to urban yellow fever in Paraguay in 2008 and the influenza (H1N1 pandemic of 2009-2010.

  7. Еcological security of environment in Zhytomyr region

    Directory of Open Access Journals (Sweden)

    I.М. Kovalevska

    2016-03-01

    Full Text Available The article is aiming at the study of environmental hazards in Zhytomir region. Its main objective is to identify the set of adverse factors affecting the state of danger and compose a necessary starting material for the prediction of possible negative consequences, their nature and extent. The matter of special importance for the study of the phenomenon of security is the security classification. First of all, the forms (system of security in relation to the forces and processes of natural, social and technical character should be distinguished. They can be defined as systems of geo-bio-physical, social and technical security. The classification of security can be determined in many ways, for example, in relation to the object of security; in relation to the subject of security; according to the problem indication; according to the functional indication. Security is a distinctive characteristic and prerequisite of life, progressive development and viability of real-world objects. The methodology of its evaluation is based on the states of the essence of natural and anthropogenic environmental pollution, the standard requirements for the quality of environmental objects and standards of acceptable contamination. The assessment of ecological security of the environment is the quantitative measure of parameters of environmental pollution dangers, threats and risks of natural character as well as the state of anthropogenic security. This assessment is carried out according to the methods and ways to measure environmental parameters. For this purpose it is important to know the factors of danger and the system of indicators that characterizes all natural and environmental phenomena and processes of geo-ecological dangers, natural environmental conditions, ecological condition. The system of natural and industrial environmental indicators consists of the indicators which characterize all phenomena and processes of geo-ecological dangers of natural

  8. Importing food damages domestic environment: Evidence from global soybean trade.

    Science.gov (United States)

    Sun, Jing; Mooney, Harold; Wu, Wenbin; Tang, Huajun; Tong, Yuxin; Xu, Zhenci; Huang, Baorong; Cheng, Yeqing; Yang, Xinjun; Wei, Dan; Zhang, Fusuo; Liu, Jianguo

    2018-05-22

    Protecting the environment and enhancing food security are among the world's Sustainable Development Goals and greatest challenges. International food trade is an important mechanism to enhance food security worldwide. Nonetheless, it is widely concluded that in international food trade importing countries gain environmental benefits, while exporting countries suffer environmental problems by using land and other resources to produce food for exports. Our study shows that international food trade can also lead to environmental pollution in importing countries. At the global level, our metaanalysis indicates that there was increased nitrogen (N) pollution after much farmland for domestically cultivated N-fixing soybeans in importing countries was converted to grow high N-demanding crops (wheat, corn, rice, and vegetables). The findings were further verified by an intensive study at the regional level in China, the largest soybean-importing country, where the conversion of soybean lands to corn fields and rice paddies has also led to N pollution. Our study provides a sharp contrast to the conventional wisdom that only exports contribute substantially to environmental woes. Our results suggest the need to evaluate environmental consequences of international trade of all other major goods and products in all importing countries, which have significant implications for fundamental rethinking in global policy-making and debates on environmental responsibilities among consumers, producers, and traders across the world.

  9. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  10. Global Food Security in a Changing Climate: Considerations and Projections

    Science.gov (United States)

    Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.

    2015-12-01

    Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.

  11. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  12. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  13. New realities: Disarmament, peace-building and global security

    International Nuclear Information System (INIS)

    1993-01-01

    This publication contains excerpts from the conference on new realities: Disarmament, peace-building and global security organized by the Non-Governmental Organization Committee on Disarmament at the United Nations, 20-23 April, 1993, during the regular session of the Disarmament Commission which took place in New York in April-May, 1993. This conference focused on important and topical disarmament and peacemaking issues, and was an opportunity for delegates, non-governmental organization representatives, United Nations staff members and interested individuals to exchange information and discuss the issues in an informal and cordial atmosphere

  14. Trust Model to Enhance Security and Interoperability of Cloud Environment

    Science.gov (United States)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  15. A Practice of Secure Development and Operational Environment Plan

    International Nuclear Information System (INIS)

    Park, Jaekwan; Seo, Sangmun; Suh, Yongsukl; Park, Cheol

    2017-01-01

    This paper suggests a practice of plan for SDOE establishment in a nuclear I and C. First, it is necessary to perform a requirements analysis to define key regulatory issues and determine the target systems. The analysis includes a survey to find out the applicable measures credited internationally. Based on the analysis results, this paper proposes an implementation plan including a process harmonizing security activities with legacy software activities and applicable technical, operational, and management measures for target systems. Recently, nuclear I and C has been faced with two security issues, cyber security (CS) and secure development and operational environment (SDOE). Unlike cyber security, few studies on planning SDOE have been presented. This paper suggests a plan for establishing an SDOE in a nuclear I and C. This paper defines three key considerations to comply with the regulatory position of RG. 1.152(R3) and proposes a process harmonizing the security activities with legacy software activities. In addition, this paper proposes technical, operational, and management measures applicable for SDOE.

  16. GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application

    Science.gov (United States)

    McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.

    2010-01-01

    The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.

  17. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  18. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  19. Management of Global Nuclear Materials for International Security

    International Nuclear Information System (INIS)

    Isaacs, T; Choi, J-S

    2003-01-01

    Nuclear materials were first used to end the World War II. They were produced and maintained during the cold war for global security reasons. In the succeeding 50 years since the Atoms for Peace Initiative, nuclear materials were produced and used in global civilian reactors and fuel cycles intended for peaceful purposes. The Nonproliferation Treaty (NPT) of 1970 established a framework for appropriate applications of both defense and civilian nuclear activities by nuclear weapons states and non-nuclear weapons states. As global inventories of nuclear materials continue to grow, in a diverse and dynamically changing manner, it is time to evaluate current and future trends and needed actions: what are the current circumstances, what has been done to date, what has worked and what hasn't? The aim is to identify mutually reinforcing programmatic directions, leading to global partnerships that measurably enhance international security. Essential elements are material protection, control and accountability (MPC and A) of separated nuclear materials, interim storage, and geologic repositories for all nuclear materials destined for final disposal. Cooperation among key partners, such as the MPC and A program between the U.S. and Russia for nuclear materials from dismantled weapons, is necessary for interim storage and final disposal of nuclear materials. Such cooperative partnerships can lead to a new nuclear regime where a complete fuel cycle service with fuel leasing and spent fuel take-back can be offered to reactor users. The service can effectively minimize or even eliminate the incentive or rationale for the user-countries to develop their indigenous enrichment and reprocessing technologies. International cooperation, supported by governments of key countries can be best to facilitate the forum for formation of such cooperative partnerships

  20. Law in Transition Biblioessay: Globalization, Human Rights, Environment, Technology

    Directory of Open Access Journals (Sweden)

    Michael Marien

    2012-04-01

    Full Text Available As globalization continues, many transformations in international and domestic laws areunderway or called for. There are too many laws and too few, too much law that is inadequateor obsolete, and too much law-breaking. This biblioessay covers some 100 recentbooks, nearly all recently published, arranged in four categories. 1 International Lawincludes six overviews/textbooks on comparative law, laws related to warfare and security,pushback against demands of globalization, and gender perspectives; 2 Human Rightsencompasses general overviews and normative visions, several books on how some statesviolate human rights, five items on how good laws can end poverty and promote prosperity,and laws regulating working conditions and health rights; 3 Environment/Resources coversgrowth of international environmental law, visions of law for a better environmental future,laws to govern genetic resources and increasingly stressed water resources, two books onprospects for climate change liability, and items on toxic hazards and problems of compliance;4 Technology, Etc. identifies eight books on global crime and the failed war on drugs,books on the response to terrorism and guarding privacy and mobility in our high-tech age,seven books on how infotech is changing law and legal processes while raising intellectualproperty questions, biomedical technologies and the law, and general views on the need forupdated laws and constitutions. In sum, this essay suggests the need for deeper and timelyanalysis of the many books on changes in law.

  1. GLOBAL DIMENSIONS OF ECOLOGICAL SECURITY IN DOMINANTA STRATEGIC PARTNERSHIP

    Directory of Open Access Journals (Sweden)

    А. Bokhan

    2014-06-01

    Full Text Available In the articles considered pressing questions of development of strategic partnership are taking into account priorities of ecological security that appears qualificatory and integrating for the countries of the world at the terms of display of calls and threats of globalization. The expediency of forming a joint environmental responsibility and market pragmatism in foreign policy of the countries of the world. Defined trends of strengthening ecological conflicts in the regions of the world because of the acute shortage of natural and energy resources, disproportions in distribution and irrational consumption. It is proved that the capacity for sustained leadership will be the countries who will testify capacity up to new forms of strategic partnership on the principles of ecological security, economic decisions considering interests and competitive aspirations for joint protection of the future of mankind. It is vitally necessary given the complexity of the influence of the parameters of the international system of ecological security in the economic, political and social transformation in society.

  2. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  3. Japanese policy on science and technology for the global environment

    International Nuclear Information System (INIS)

    Kawasaki, M.

    1994-01-01

    The current state of Japanese science and technology policy is discussed within the framework of overall global environmental policy. Principles of Japanese environmental policy include participation in international schemes for conservation of the global environment, promotion of Japanese research on the global environment, development and diffusion of technologies contributing to conservation of the global environment, contribution to conservation of the environment in developing countries, and maintenance of economic and social activities in Japan at an environmentally beneficial level. The Japanese environmental budget includes expenditures for earth observation and monitoring by satellite, energy-related research and development, and control of greenhouse gas emissions. The proportion of overall Japanese research and development (R ampersand D) expenditures which were spent on the global environment was about 2% in 1991. Of governmental research expenditures, ca 22% involve the global environment; however, some part of the expenditures on energy R ampersand D and on earth observation satellite R ampersand D are also environment-related. 5 figs

  4. The EU's New Global Strategy : Its Implementation in a Troubled International Environment

    NARCIS (Netherlands)

    Buitelaar, T.; Larik, J.E.; Matta, A.; Vos, de B.

    2016-01-01

    Executive Summary In June 2016, High Representative Mogherini presented the EU’s new Global Strategy on Foreign and Security Policy (EUGS) to the European Council. With the Strategy now finalized, attention needs to turn to its implementation in an environment mired by crises both within Europe and

  5. Precision Security: Integrating Video Surveillance with Surrounding Environment Changes

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2018-01-01

    Full Text Available Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes (EC with a processes-based cognition model by introducing a ratio value λ of EC-implications within considered periods. Theoretical models for computation of warning level of EC-implications to the universal video recognition efficiency (quantified as time cost of implication-ratio variations from λk to λk+1, k=1,2,… are further established. Imbedding proposed models into the online algorithms is suggested as a future research priority towards precision security for critical applications and, furthermore, schemes for a practical implementation of such integration are also preliminarily discussed.

  6. Research on Influence of Cloud Environment on Traditional Network Security

    Science.gov (United States)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  7. The Global Environment Radiation Monitoring Network (GERMON)

    International Nuclear Information System (INIS)

    Zakheim, B.J.; Goellner, D.A.

    1994-01-01

    Following the Chernobyl accident in 1986, a group of experts from the World Health Organization (WHO) and the United Nations Environment Program (UNEP) met in France to discuss and develop the basic principles of a global environmental radiation monitoring network (GERMON). The basic functions of this network were to provide regular reports on environmental radiation levels and to be in a position to provide reliable and accurate radiation measurements on a quick and accurate radiation measurements on a quick turnaround basis in the event of a major radiation release. By 1992, although 58 countries had indicated an interest in becoming a part of the GERMON system, only 16 were providing data on a regular basis. This paper traces the history of GERMON from its inception in 1987 through its activities during 1993-4. It details the objectives of the network, describes functions, lists its participants, and presents obstacles in the current network. The paper examines the data requirements for radiological emergency preparedness and offers suggestions for the current system. The paper also describes the growing need for such a network. To add a domestic perspective, the authors present a summary of the environmental monitoring information system that was used by the NRC in 1986 in its analyses of the Chernobyl incident. Then we will use this 1986 experience to propose a method for the use of GERMON should a similar occasion arise in the future

  8. A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment

    Science.gov (United States)

    Ula, M.; Ula, M.; Fuadi, W.

    2017-02-01

    As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.

  9. APPROACHES TO GLOBAL SECURITY. ACTORS, MANIFESTATIONS AND TENDENCIES

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2013-01-01

    Full Text Available Nowadays, the world seems to be in a transition from the current system founded on the liberal social, economic and political model to a more diverse and heterogeneous model in which the determinant role is played by a number of state and non-state actors. The step from the Western system of cultural, political and predominant economic values to a more diverse and heterogeneous system makes the actors involved defend not only their visions, but also promote their own interests. The differences between visions gain relevance and clarity because the countries supporting them obtain increased power, and that is more than obvious. All this leads to a symmetric allocation of different means, which generates uncertainties and diminishes unilateral actions This transition process impacts global security especially through the asymmetric, unconventional and hybrid risks and threats manifesting worldwide.

  10. Energy policy seesaw between security and protecting the environment

    International Nuclear Information System (INIS)

    Finon, D.

    1994-01-01

    It is just the price of oil that causes the energy policies of importing countries to vacillate. Changing perceptions of energy supply factors has had as much to do with transfiguring government action modes since 1973 as has the idea of the legitimacy of that action. The present paper thus draws a parallel between the goal of energy security twenty years ago and that of global environmental protection today, which explains the critical reversion to a view of minimum government action in the energy field - a view that marked the eighties. (author). 20 refs

  11. Security in Distributed Collaborative Environments: Limitations and Solutions

    Science.gov (United States)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  12. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  13. Global water cycle: geochemistry and environment

    National Research Council Canada - National Science Library

    Berner, Elizabeth Kay; Berner, Robert A

    1987-01-01

    .... The book provides an integrated approach to global geochemistry and environmental problems and introduces the reader to some fundamental concepts of geology, oceanography, meteorology, environmental...

  14. Desovereignization of national state, economy and security in terms of globalization

    Directory of Open Access Journals (Sweden)

    Rakić Mile M.

    2014-01-01

    Full Text Available In current modern age of worldwide processes of globalization and globalism a process of desovereigntization of national state and economy has become a general process. Therefore national state has been faced with numerous challenges and it has been in a permanent state of crisis. Within the process of globalization most often rich enclaves of national states make attempts to integrate themselves into neoliberal capitalist system, while poor and backward enclaves become abandoned and so national states become disintegrated. First of all it is necessary to search for causes of ethno-religious conflicts and a national separatism in the field of economy. Within the globalization environment it happened that old entities, national state, national economy and national security gained totally new meanings. By using a method of comparative analysis of document contents and consitutional and political practice alike it is possible to reach conclusion that a great number of modern national states, including the Republic of Serbia among them, have found themselves in the state of permanent crisis, and the state crisis implies, before anything else, the crisis of state sovereignty. The state gets destroyed both from inside and outside in different ways. By using a quality method it is confirmed that within a state there comes an overstepping of constitutional regulations which encompass, before else, the issues of national economy and national security, and it is achieved in particular by seizure of economic sovereignty.

  15. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  16. Arsenic contamination in food chain: Thread to global food security

    Science.gov (United States)

    Kashyap, C. A.

    2016-12-01

    The supply of good quality food is a necessity for economic and social health of urban and rural population. Over the last several decades groundwater contamination in developing countries has assumed dangerous levels as a result millions of people are at risk. This is so particularly with respect to arsenic that has registered high concentration in groundwater in countries like India and Bangladesh. The arsenic content in groundwater varies from 10 to 780 µg/L, which is far above the levels for drinking water standards prescribed by World Health Organization (WHO). Currently arsenic has entered in food chain due to irrigation with arsenic contaminated water. In the present study reports the arsenic contamination in groundwater that is being used for irrigating paddy in Manipur and West Bengal. The arsenic content in irrigation water is 475 µg/L and 780 µg/L in Manipur and West Bengal, respectively. In order to assess the effect of such waters on the rice crop, we collected rice plant from Manipur and determined the arsenic content in roots, stem, and grain. The arsenic content in grain varies from 110 to 190 mg/kg while the limit of arsenic intake by humans is 10 mg/kg (WHO). This problem is not confine to the area, it spread global level, and rice being cultivated in these regions is export to the other countries like USA, Middle East and Europe and will be thread to global food security.

  17. Key Trends Shaping the Global Logistics Environment

    DEFF Research Database (Denmark)

    Handfield, Robert; Straube, Frank; Pfohl, Hans-Christian

    A summary from the full study “Trends and Strategies in Logistics and Supply Chain Management. Embracing Global Logistics Complexity to Drive Market Advantage” (2013).......A summary from the full study “Trends and Strategies in Logistics and Supply Chain Management. Embracing Global Logistics Complexity to Drive Market Advantage” (2013)....

  18. Marketing Management: Monitoring the International Environment Factors Using Global Maps

    Directory of Open Access Journals (Sweden)

    Štěpán Kala

    2015-01-01

    Full Text Available The article discusses the issue of the global marketing environment in line with the factors determining its external conditions. The aim is to specify the marketing-environment indicators in the international context and interpret the use of geographical maps illustratively documenting the differences of particular parameters in various parts of the global market. The research-results help update the theoretical framework of global environment factors. These data are also important for practice. Many enterprises consider the question of optimising their sources and directing their goals towards the opportunities available thanks to global markets. The global environment mapping is thereby an important basis for the marketing activities whose implementation across national boundaries is going to be mainly influenced by peculiarities of the environment involving foreign markets and their changes.

  19. Enhancing energy security in Malayia: the challenges towards sustainable environment

    International Nuclear Information System (INIS)

    Sahid, E J M; Peng, L Y; Siang, C Ch

    2013-01-01

    Energy is known as one of the essential ingredients for economic development and security of energy supply is crucial in ensuring continuous economic development of a country. Malaysia's proven domestic oil reserves are estimated to last for another 25 years, while that of gas for another 39 years as of 2011. Despite the depleting indigenous energy resources, the primary energy demand has continued to grow robustly, at an annual rate of 6.3 percent per year from 1990 to 2010, while the primary energy import has grown 7.2% per year and the primary energy export has grown at a slower rate of 1.9% per year. This worrying trend is further compounded by the faster rate of primary oil import averaging 10.5% per year while the primary energy export has shrink at a rate of 1.4% per year. This paper has identified two main concerns namely overdependence on fossil fuel and increasing energy import dependency in creating a precarious position towards energy self-sufficiency. The study will analyse the energy security of the country and explore possible options and challenges in enhancing the energy supply security toward sustainable environment.

  20. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  1. The Future of the Global Environment: A Model-based Analysis Supporting UNEP's First Global Environment Outlook

    NARCIS (Netherlands)

    Bakkes JA; Woerden JW van; Alcamo J; Berk MM; Bol P; Born GJ van den; Brink BJE ten; Hettelingh JP; Langeweg F; Niessen LW; Swart RJ; United Nations Environment; MNV

    1997-01-01

    This report documents the scenario analysis in UNEP's first Global Environment Outlook, published at the same time as the scenario analysis. This Outlook provides a pilot assessment of developments in the environment, both global and regional, between now and 2015, with a further projection to

  2. Incorporating Global Information Security and Assurance in I.S. Education

    Science.gov (United States)

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  3. Causes of improvement in the security environment of Iraq, 2006-2009

    OpenAIRE

    Wheeler, Seth A.

    2009-01-01

    Approved for public release, distribution unlimited Popular consensus exists that the 2007 surge of U.S. forces in Iraq led to an improved security environment. The surge was designed to reduce violence and improve security by protecting the Iraqi population - a change in strategy. According to the consensus, the security environment improved due to the surge, measured by the decreasing number of attacks. For this thesis, the security environment consists of the number of attacks and t...

  4. Strengthening global health security capacity--Vietnam demonstration project, 2013.

    Science.gov (United States)

    Tran, Phu Dac; Vu, Long Ngoc; Nguyen, Hien Tran; Phan, Lan Trong; Lowe, Wayne; McConnell, Michelle S; Iademarco, Michael F; Partridge, Jeffrey M; Kile, James C; Do, Trang; Nadol, Patrick J; Bui, Hien; Vu, Diep; Bond, Kyle; Nelson, David B; Anderson, Lauren; Hunt, Kenneth V; Smith, Nicole; Giannone, Paul; Klena, John; Beauvais, Denise; Becknell, Kristi; Tappero, Jordan W; Dowell, Scott F; Rzeszotarski, Peter; Chu, May; Kinkade, Carl

    2014-01-31

    Over the past decade, Vietnam has successfully responded to global health security (GHS) challenges, including domestic elimination of severe acute respiratory syndrome (SARS) and rapid public health responses to human infections with influenza A(H5N1) virus. However, new threats such as Middle East respiratory syndrome coronavirus (MERS-CoV) and influenza A(H7N9) present continued challenges, reinforcing the need to improve the global capacity to prevent, detect, and respond to public health threats. In June 2012, Vietnam, along with many other nations, obtained a 2-year extension for meeting core surveillance and response requirements of the 2005 International Health Regulations (IHR). During March-September 2013, CDC and the Vietnamese Ministry of Health (MoH) collaborated on a GHS demonstration project to improve public health emergency detection and response capacity. The project aimed to demonstrate, in a short period, that enhancements to Vietnam's health system in surveillance and early detection of and response to diseases and outbreaks could contribute to meeting the IHR core capacities, consistent with the Asia Pacific Strategy for Emerging Diseases. Work focused on enhancements to three interrelated priority areas and included achievements in 1) establishing an emergency operations center (EOC) at the General Department of Preventive Medicine with training of personnel for public health emergency management; 2) improving the nationwide laboratory system, including enhanced testing capability for several priority pathogens (i.e., those in Vietnam most likely to contribute to public health emergencies of international concern); and 3) creating an emergency response information systems platform, including a demonstration of real-time reporting capability. Lessons learned included awareness that integrated functions within the health system for GHS require careful planning, stakeholder buy-in, and intradepartmental and interdepartmental coordination and

  5. Man's impact on his global environment

    International Nuclear Information System (INIS)

    Knox, J.B.

    1976-07-01

    The experience and awareness growing from research activities leads to several important concerns for policy makers: there is a need to move towards a policy of conservation of our global air resources in its totality from earth's surface to stratosphere; the technical data base and level of understanding should be systematically improved for the rational implementation of standards for the whole atmosphere; the U.S. should establish a focal point for regional and global environmental assessments responsive to policy-makers' needs and concerns, and interactive with the UN's Global Environmental Monitoring System; and the environmental consequences of increased U.S. dependence on coal should receive greater attention so that optimal choices between control technology, tall stacks, and synthetic fuels may be achieved with conservation of total air resources

  6. The First International Conference on Global Food Security – A Synthesis

    NARCIS (Netherlands)

    Ittersum, van M.K.; Giller, K.E.

    2014-01-01

    Improving food security is difficult. There are many reasons why hunger and malnutrition persist, not least because deep social inequities and conflicts often dominate. Equally many approaches are needed to deal with this global problem. In the case of global food security, improvements can depend

  7. The Globalization of Higher Education as a Societal and Cultural Security Problem

    Science.gov (United States)

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  8. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  9. Global Food Security Index Studies and Satellite Information

    Science.gov (United States)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  10. Global environment and activity of RITE

    International Nuclear Information System (INIS)

    Kondo, Jiro

    1991-01-01

    In the present paper, the author would like to discuss the relation between conventional energy and global warming. Research Institute of Innovative Technology for the Earth (RITE) was established in Japan, September 1990. The author would like to introduce what RITE is intending to achieve. This is the case when technology leads science. (J.P.N.)

  11. METHODOLOGICAL APPROACHES TO THE ANALYSIS OF ЕCONOMIC SECURITY MARKET ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    V. P. Voronin

    2014-01-01

    Full Text Available Summary The market environment is not only important for the good functioning of enterprises and organizations, but also an indicator of the attractiveness for business. In this regard, on the first place of its economic analysis of the state and dynamics, not only the definition of capacity and market, but also its innovation, investment and institutional components, as well as economic security for businesses and organizations. Economic security for businesses and organizations associated with the identification of factors affecting the state of criminal and corrupt elements. Globalization of world economic relations led to the spread of corruption market environment from local to global markets. Increasingly close involvement of Russia into the world economy was accompanied by negative phenomena of this nature. This was facilitated by liberalization of public relations; sharp stratification of society in terms of income, inefficient system of income redistribution: the weakness and backwardness of civil institutions, all lower income level communication with the humanistic and patriotic values. As a result, generated problems and threats: market institutions there, ethical values and justice, sustainable normal course of business. Simultaneously, it contributes to the establishment and complication of the linkages between corruption and economic crime, the spread of illicit acquisition of personal wealth. Needless business community can and should take an active part in monitoring and economic analysis of the marketing environment of enterprises and organizations, making it more transparent and accessible information across a wide range of its customers.

  12. An Analysis of Security System for Intrusion in Smartphone Environment

    Directory of Open Access Journals (Sweden)

    Maya Louk

    2014-01-01

    Full Text Available There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a MDTN process is possible and will be enabled for Smartphone environment. (b The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  13. An analysis of security system for intrusion in Smartphone environment.

    Science.gov (United States)

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  14. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  15. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  16. The global atmospheric environment for the next generation

    NARCIS (Netherlands)

    Dentener, F.; Stevenson, D.; Ellingsen, K.; Noije, van T.; Schultz, M.; Amann, M.; Atherton, C.; Bell, N.; Bergmann, D.; Bey, I.; Bouwman, L.; Butler, T.; Cofala, J.; Collins, B.; Drevet, J.; Doherty, R.; Eickhout, B.; Eskes, H.; Fiore, A.; Gauss, M.; Hauglustaine, D.; Horowitz, L.; Isaksen, I.S.A.; Josse, B.; Lawrence, M.; Krol, M.C.; Lamarque, J.F.; Montanaro, V.; Müller, J.F.; Peuch, V.H.; Pitari, G.; Pyle, J.; Rast, S.; Rodriguez, J.; Sanderson, M.; Savage, N.H.; Shindell, D.; Strahan, S.; Szopa, S.; Sudo, K.; Dingenen, van R.; Wild, O.; Zeng, G.

    2006-01-01

    Air quality, ecosystem exposure to nitrogen deposition, and climate change are intimately coupled problems: we assess changes in the global atmospheric environment between 2000 and 2030 using 26 state-of-the-art global atmospheric chemistry models and three different emissions scenarios. The first

  17. The effective strategic leadership in the global competitive environment

    OpenAIRE

    Miceski, Trajko

    2012-01-01

    This paper focuses on strategic leadership and its importance as a potential source of competitive advantage in today's era of globalization. Strategic leadership can be defined as ability to: influence without coercion, prediction, vision, maintaining flexibility, anticipation of positive change, mobilizing and effectuation of human resources and many other activities that allow the company to the forefront in the global competitive environment.

  18. Does nuclear energy save global environment?

    International Nuclear Information System (INIS)

    Matsui, Kazuaki

    2006-01-01

    Since the ecological footprint analysis in 1970s suggested changing consumption patterns and overpopulation concerns, energy policy such as energy conservation and use of renewable energy has become of prime importance. Several results of the long-term energy demand and supply analysis in 2050 or 2100 to reduce drastically carbon dioxide emission as a measure against global warming, showed the necessity of nuclear power deployment as well as maximum efforts to save energy, exploitation of the separation and disposal of carbon dioxide, and shifting energy sources to fuels that emit less greenhouse gases or non-fossil fuels. As a promising means to contribute to long-term energy supply, nuclear power generation is expected with improving safety, economic efficiency, environmental adaptability, and nuclear proliferation resistance of the technologies. (T.Tanaka)

  19. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on radioisotope production and radiation technology contributing to better health care and a cleaner environment

    International Nuclear Information System (INIS)

    2012-01-01

    Radioisotope and radiation technology finds numerous applications in a wide variety of fields, most importantly in medicine, industry, agriculture and the environment. However, in order to take full advantage of the benefits offered by this technology, it is essential to provide the necessary infrastructure as well as qualified personnel. The IAEA strives to promote worldwide availability of products and facilities in order to offer the benefits of radioisotope products and radiation technology to developing countries. In particular, the IAEA helps Member States to achieve self-sufficiency in the production of radioisotopes and radiopharmaceuticals, strengthen quality assurance practices and regulatory compliance as well as facilitate human resources development. The multipronged need based approach includes providing advice, assistance and capacity building support for: Development, production and quality assurance of reactor and accelerator based medical isotopes and radiopharmaceuticals for both the diagnosis and treatment of diseases, especially cancer; Establishment of irradiation facilities and utilization of gamma radiation, electron beam and X ray technology for varied applications, including tackling pollutants, wastewater treatment, sterilization of medical products, disinfestation of food grains, and synthesis and characterization of advanced materials; Application of radiation and isotopes in industrial process management.

  20. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  1. The adoption of IT security standards in a healthcare environment.

    Science.gov (United States)

    Gomes, Rui; Lapão, Luís Velez

    2008-01-01

    Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.

  2. Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis

    OpenAIRE

    Princely Ifinedo

    2015-01-01

    Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and controls in the financial services industry. Essentially, it seeks to enrich the information provide...

  3. The Future of the Global Environment: A Model-based Analysis Supporting UNEP's First Global Environment Outlook

    OpenAIRE

    Bakkes JA; Woerden JW van; Alcamo J; Berk MM; Bol P; Born GJ van den; Brink BJE ten; Hettelingh JP; Langeweg F; Niessen LW; Swart RJ; United Nations Environment Programme (UNEP), Nairobi, Kenia; MNV

    1997-01-01

    This report documents the scenario analysis in UNEP's first Global Environment Outlook, published at the same time as the scenario analysis. This Outlook provides a pilot assessment of developments in the environment, both global and regional, between now and 2015, with a further projection to 2050. The study was carried out in support of the Agenda 21 interim evaluation, five years after 'Rio' and ten years after 'Brundtland'. The scenario analysis is based on only one scenario, Conventional...

  4. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  5. Methodology for considering environments and culture in developing information security systems

    OpenAIRE

    Mwakalinga, G Jeffy; Kowalski, Stewart; Yngström, Louise

    2009-01-01

    In this paper, we describe a methodology for considering culture of users and environments when developing information security systems. We discuss the problem of how researchers and developers of security for information systems have had difficulties in considering culture of users and environments when they develop information security systems. This has created environments where people serve technology instead of technology serving people. Users have been considered just as any other compo...

  6. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  7. Transforming Gender and Food Security in the Global South | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-09-29

    Sep 29, 2016 ... It investigates how food security and gender inequity are conceptualized within ... underlying social, cultural, and economic causes of gender inequality. Taken together, these combined approaches enable women and men to ...

  8. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Science.gov (United States)

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  10. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  11. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  12. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    National Research Council Canada - National Science Library

    Hubenko, Jr, Victor P

    2008-01-01

    With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration...

  13. Global food and fibre security threatened by current inefficiencies in fungal identification

    NARCIS (Netherlands)

    Crous, Pedro W.; Groenewald, Johannes Z.; Slippers, Bernard; Wingfield, Michael J.

    2016-01-01

    Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity,

  14. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  15. Global environment outlook GEO5. Environment for the future we want

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-05-15

    The main goal of UNEP's Global Environment Outlook (GEO) is to keep governments and stakeholders informed of the state and trends of the global environment. Over the past 15 years, the GEO reports have examined a wealth of data, information and knowledge about the global environment; identified potential policy responses; and provided an outlook for the future. The assessments, and their consultative and collaborative processes, have worked to bridge the gap between science and policy by turning the best available scientific knowledge into information relevant for decision makers. The GEO-5 report is made up of 17 chapters organized into three distinct but linked parts. Part 1 - State and trends of the global environment; Part 2 - Policy options from the regions; Part 3 - Opportunities for a global response.

  16. Global environment outlook GEO5. Environment for the future we want

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-05-15

    The main goal of UNEP's Global Environment Outlook (GEO) is to keep governments and stakeholders informed of the state and trends of the global environment. Over the past 15 years, the GEO reports have examined a wealth of data, information and knowledge about the global environment; identified potential policy responses; and provided an outlook for the future. The assessments, and their consultative and collaborative processes, have worked to bridge the gap between science and policy by turning the best available scientific knowledge into information relevant for decision makers. The GEO-5 report is made up of 17 chapters organized into three distinct but linked parts. Part 1 - State and trends of the global environment; Part 2 - Policy options from the regions; Part 3 - Opportunities for a global response.

  17. Soil erosion, climate change and global food security: challenges and strategies.

    Science.gov (United States)

    Rhodes, Christopher J

    2014-01-01

    supply fails, global agriculture fails too, with obvious consequences. Accordingly, on grounds of stabilising the climate, preserving the environment, and ensuring the robustness of the global food supply, maintaining and building good soil, in particular improving its SOM content and hence its structure, is highly desirable. Those regions of the world that are significantly degraded are unlikely to support a massive population increase (e.g. Africa, whose population is predicted to grow from its present 1.1 billion to 4.2 billion by 2100), in which case a die-off or mass migration might be expected, if population control is not included explicitly in future plans to achieve food security.

  18. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  19. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    International Nuclear Information System (INIS)

    Dorman, E.

    2014-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  20. E-business Environment in the Global Information Society

    OpenAIRE

    Vymětal, Dominik; Suchánek, Petr

    2009-01-01

    In today´s digital 21st century, almost all businesses face intense competition from competitors all around the globe. There are no borders and business area for the all companies is almost unlimited. As the main supports of mentioned fact are globalization and ICT´s development. Influences such as globalization, increased popularity of outsourcing and offshoring have recently combined to produce an environment where ICT graduates need to have up-to-date and industry-relevant knowledge and sk...

  1. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  2. Global Food Security Problems in the Modern World Economy

    Science.gov (United States)

    Abdulkadyrova, Madina A.; Dikinov, Andzor H.; Tajmashanov, Hassan È.; Shidaev, Lomali A.; Shidaeva, Eliza A.

    2016-01-01

    Importance: Food problem at the present stage of development of mankind is that due to improper and overly intensive use of natural resources, increasing demand for livestock products, increasing per capita food consumption and other factors, there has been a steady rise in food prices, represents a threat to food security in the countries with…

  3. Global change, urban livelihoods and food security; presentation

    CSIR Research Space (South Africa)

    Murambadoro, M

    2012-02-01

    Full Text Available Food security research and policy have focused more on the rural poor where the incidence and depth of poverty is more pronounced. Urban livelihoods are based on cash income and many people in urban areas are employed in the informal sector which...

  4. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  5. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    29 sept. 2016 ... Jemimah Njuki is a senior program officer in the Agriculture and Food Security program at the International Development Research Centre (IDRC), based in Nairobi, Kenya. John R. Parkins is a professor in the Department of Resource Economics and Environmental Sociology, University of Alberta, Canada ...

  6. Family Food Security and Children’s Environment: A Comprehensive Analysis with Structural Equation Modeling

    OpenAIRE

    Che Wan Jasimah bt Wan Mohamed Radzi; Huang Hui; Nur Anisah Binti Mohamed @ A. Rahman; Hashem Salarzadeh Jenatabadi

    2017-01-01

    Structural Equation Modeling (SEM) has been used extensively in sustainability studies to model relationships among latent and manifest variables. This paper provides a tutorial exposition of the SEM approach in food security studies and introduces a basic framework based on family food security and children’s environment sustainability. This framework includes family food security and three main concepts representing children’s environment, including children’s BMI, health, and school perfor...

  7. A study of institutional environment and household food security at ...

    African Journals Online (AJOL)

    The study looked into the current scenario of food security in Rwanda. After analysing the national level institutional and food security scenarios by using available secondary data, the researchers used primary data that have been collected from a random sample of 200 households spreading over six sectors of the Huye ...

  8. Towards an automated security awareness system in a virtualized environment

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2012-07-01

    Full Text Available resources. This is an efficient solution to access the Internet. However users might not be aware of the security threats that exist on using shared resources. Many companies provide security solutions to automatically protect resources on the network...

  9. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  10. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    The global supply chain is the network of suppliers, manufacturing centers, warehouses, distribution centers, and retail outlets that transforms raw materials into finished products and delivers them to consumers...

  11. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    Science.gov (United States)

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  12. Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

    Directory of Open Access Journals (Sweden)

    Liu Qian

    2017-01-01

    Full Text Available For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel, therefore the security and trusted degree of lightweight virtualization container isolation mechanism is critical for the promotion of lightweight virtualization service. Because the user cannot directly participate in the process of the construction and management of container isolation mechanism, it is difficult for them to establish confidence in the security and trusted degree of container isolation mechanism. Based on the research and analysis of system credible and virtualization isolation mechanism, this paper puts forward a set of lightweight virtualization security isolation strategy mechanism, divides lightweight virtualization container storage address space into several parts, puts forward the definition of lightweight virtualization security isolation, gives the formal description and proof of container security isolation strategy, and combines with related technology to verify the feasibility of lightweight virtualization security isolation strategy mechanism. The mechanism has important guiding significance for cloud services providers to deploy container security isolation.

  13. WHO global and regional strategies for health and environment

    International Nuclear Information System (INIS)

    Hisashi Ogawa

    1996-01-01

    This paper describes the WHO global and regional strategies for health and environment and discusses research needs on environmental health to support the implementation of the strategies. Particular emphasis on applied researches which generate information, for decision making, on health effects of development and environmental changes in specific locations

  14. WHO global and regional strategies for health and environment

    Energy Technology Data Exchange (ETDEWEB)

    Ogawa, Hisashi [World Health Organization, Manila (Philippines). Regional Office for the Western Pacific

    1997-12-31

    This paper describes the WHO global and regional strategies for health and environment and discusses research needs on environmental health to support the implementation of the strategies. Particular emphasis on applied researches which generate information, for decision making, on health effects of development and environmental changes in specific locations.

  15. Modelling Global Pattern Formations for Collaborative Learning Environments

    DEFF Research Database (Denmark)

    Grappiolo, Corrado; Cheong, Yun-Gyung; Khaled, Rilla

    2012-01-01

    We present our research towards the design of a computational framework capable of modelling the formation and evolution of global patterns (i.e. group structures) in a population of social individuals. The framework is intended to be used in collaborative environments, e.g. social serious games...

  16. International Management: Creating a More Realistic Global Planning Environment.

    Science.gov (United States)

    Waldron, Darryl G.

    2000-01-01

    Discusses the need for realistic global planning environments in international business education, introducing a strategic planning model that has teams interacting with teams to strategically analyze a selected multinational company. This dynamic process must result in a single integrated written analysis that specifies an optimal strategy for…

  17. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  18. Modeling higher education attractiveness to stand global environment

    Directory of Open Access Journals (Sweden)

    Leonel Cezar Rodrigues

    2016-04-01

    Full Text Available Inabilities to deal with the changing environment may lead Higher Education Institutions (HEI to loose institutional attractiveness. Digital transformation requires global insertion as essential feature to institutional attractiveness. Processes for international education seem to lack the links between real environmental trends and the internal capabilities to global education. HEI managers may approach endeavors to internationalize education combining ambidextrous strategy supported by consolidated resilience capabilities. The latest ones refer to building internal value attributes to increase institutional attractiveness assuring solid standing in the global environment. In this article, a theoretical essay, we approach the problem of creating resilience as a way of backing up ambidexterity to generate institutional attractiveness. The set of value attributes, on the other hand, may originate strategic routes to strengthen internal competences and to make the institution more attractive, as a dynamic capability.

  19. Security Analysis in the Migration to Cloud Environments

    Directory of Open Access Journals (Sweden)

    Eduardo Fernández-Medina

    2012-05-01

    Full Text Available Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to move their data and applications to the cloud. We justify the importance and motivation of security in the migration of legacy systems and we carry out an analysis of different approaches related to security in migration processes to cloud with the aim of finding the needs, concerns, requirements, aspects, opportunities and benefits of security in the migration process of legacy systems.

  20. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  1. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    Science.gov (United States)

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  2. Managing information security in a process industrial environment; Gestao de seguranca da informacao em processos industriais

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Raphael Gomes; Aguiar, Leandro Pfleger de [Siemens Company (Brazil)

    2008-07-01

    With the recently globalization expansion (growth), the exploration of energetic resources is crossing over countries boundaries, resulting in worldwide companies exploring Oil and Gas fields available in any place of the world. To the government's bodies, this information about those fields should be treated as a national security interest subject by bringing an adequate management and protection to all the important and critical information and assets, and making possible, at the same time, the freedom and transparency in concurrence processes. This create a complex security context to be managed, where information disruption might, for instance, imply in broke of integrity in public auctions processes as a result of privileged information usage. Furthermore, with the terrorism problem, the process itself becomes an attractive target for different kinds of attacks, motivated by the opportunism to explore the known incapacity of the big industries in well manage their large and complex environments. With all transformations that are happening in productive processes, as the growing TCP/IP protocol usage, the Windows operating systems adoption in SCADA systems and the integration of industrial with business network, are factors that contribute to an eminent landscape of problems. This landscape demonstrates the need from the organizations and countries that are operating in energetic resources exploration, for renew their risk management areas, establishing a unique and integrated process to protect information security infrastructure. This work presents a study of the challenges to be faced by the organizations while rebuilding their internal processes to integrate the risk management and information security areas, as long as a set of essential steps to establish an affective corporative governance of risk management and compliance aspects. Moreover, the work presents the necessary points of the government involvement to improve all the regulatory aspects

  3. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  4. Experiments in globalization, food security and land use decision making

    NARCIS (Netherlands)

    Brown, C.; Murray-Rust, D.; van Vliet, J.; Alam, S. J.; Verburg, P.H.; Rounsevell, M.D.A.

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often

  5. On global environment problems in electric power business

    International Nuclear Information System (INIS)

    Sugi, Masashi

    1992-01-01

    The former environmental problems were atmospheric pollution, water quality contamination, noise and vibration nuisance, waste disposal and so on mainly at interior or district level, but now, the influence that the problems such as the global warming due to carbon dioxide emission, the ozone layer breaking due to freon gas, acid rain going over boundaries and so on exert to environment spreads to wide areas, therefore, various research and investigation have been carried out as the environmental problems on global scale at national and international levels. It has become an important subject to make the preservation of global environment and durable economical development compatible by effectively utilizing limited resources and energy. The electric power companies have advanced positively the prevention of pollution and the preservation of environment, and attained the environment preservation of top level in the world. The consciousness of people on environmental problems has heightened, therefore the construction and operation of power plants harmonized to districts are important. The countermeasures to environmental problems taken by electric power companies are reported. (K.I.)

  6. Bioseguridad in Mexico: Pursuing Security between Local and Global Biologies.

    Science.gov (United States)

    Wanderer, Emily Mannix

    2017-09-01

    In the aftermath of the 2009 outbreak of H1N1 influenza, scientists in Mexico sought to develop bioseguridad, that is, to protect biological life in Mexico by safely conducting research on infectious disease. Drawing on ethnographic research in laboratories and with scientists in Mexico, I look at how scientists make claims about local differences in regulations, infrastructure, bodies, and culture. The scientists working with infectious microbes sought to establish how different microbial ecologies, human immune systems, and political and regulatory systems made the risks of research different in Mexico from other countries. In developing bioseguridad, the idea of globalized biology that animates many public health projects was undermined as scientists attended to the elements of place that affected human health and safety. Scientists argued for the importance of local biologies, generating tension with global public health projects and regulations premised on the universality of biology. © 2016 by the American Anthropological Association.

  7. Guidelines and recommendations for regional approaches to disarmament within the context of global security

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Guidelines and recommendations for regional approaches to disarmament within the context of global security provide both a conceptual framework within which to pursue arms control in South Asia and a variety of concrete mechanisms or tools to carry out the task. However, they cannot operate independently of a broader process of political accommodation, which might be named as 'cooperative security building'. That process, however embryonic, is under way across Asia Pacific region

  8. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  9. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  10. European Security Organizations in the Post-Cold-War Security Environment. The New Frame of European Security

    National Research Council Canada - National Science Library

    Bugai, Veaceslav

    2006-01-01

    .... In particular, it gives an over view of the transformations that occurred within NATO and OSCE in the post-Cold War period, which have created and developed new security mechanisms and policies for dealing with crises...

  11. Financial security of the state in terms of globalization processes escalation

    Directory of Open Access Journals (Sweden)

    Svitlana Tkalenko

    2013-02-01

    Full Text Available The article provides review of the globalization and global integration processes impact on the financial sector formation characterized by an increase in financial flows with the lead role played by transnational corporations and transnational banks. The globalization study has been already reflected by numerous scientific publications and various issues of reputable international academic journals describing the process as irreversible and objective along with demonstrating globalization merits and demerits, etc. In the 21st century, globalization is an issue discussed by everyone: ranging from presidents, prime ministers and members of parliament supposed to solve problems of any scale taking into consideration the global development phenomenon, to ordinary citizens. Today, globalization has obviously become a major trend of the modern world development, which is why issues implying sound development assurance become pressing for each country. The article dwells upon the main component of economic security — the financial one (Ukraine case study. Thus, we are engaged in studying the global development trend in terms of assuring security of the state under conditions of financial flows globalization and existence of global integration processes.

  12. Securing the Data Storage and Processing in Cloud Computing Environment

    Science.gov (United States)

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  13. Teaching Network Security in a Virtual Learning Environment

    Science.gov (United States)

    Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik

    2004-01-01

    This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…

  14. An Overview of Global Nuclear Security Regime and Its Introduction into the Nigerian Educational System

    International Nuclear Information System (INIS)

    Jonah, S.A.

    2013-01-01

    Nuclear security is the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the respective country. Within a State the nuclear security regime resembles layers of an onion with equipment and personnel securing the borders and ports representing the outer layer. Nuclear power, research reactor and nuclear medicine facilities constitute the various inner layers down to the actual target materials. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, hardware and software. Nigeria is a non-nuclear weapons state and without a large-scale nuclear industry, but have a major role to play in preventing nuclear terrorism globally. It is pertinent to know that as the Fukushima accident and other nuclear accidents have demonstrated, nuclear crises do not respect borders. Therefore, nuclear threats must be addressed by all nations. Furthermore, to set the groundwork for the safe, peaceful and stable use of nuclear energy in Nigeria and all over the world, efforts must be made to enhance nuclear safety and security. This paper discusses the present international nuclear security regime and possibility of integrating it into the Nigerian educational system in view of current global perspectives and nuclear renaissance.

  15. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  16. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and non-market tools, depending on the institutional and business environment in a particular region.......This paper documents the strong growth in tools used by firms to protect their intellectual property (IP), develop their know-how, and build and maintain their reputation globally. We focus on three tools that have become increasingly important in the last several decades: patents, trademarks...... experiencing the most growth. These trends in applications are less evident when we study which applications are actually granted. For example, the shift in IP activity toward middle-income countries and Asia is less pronounced, and the most developed countries still lead globally. Moreover, there seems...

  17. Russian spent marine fuel as a global security risk

    International Nuclear Information System (INIS)

    Gussgard, K.; Reistad, O.

    2001-01-01

    Russian marine fuel is a trans-national security concern. This paper focuses on specific technical properties of Russian marine nuclear fuel especially relevant for evaluating different aspects on nuclear proliferation, in addition to risks associated with regional environmental degradation and illegal diversion of radiological substances. Russian fresh fuel for marine reactors has been involved in several significant cases of illicit trafficking of special nuclear materials. The amount and quality of nuclear materials in Russian spent marine fuel give also reason for concern. Not less than 200 marine reactor cores are ready for having their spent fuel unloaded and preliminary stored on shore in the Far East and North West of Russia, and large amounts of spent naval fuel have been stored at Russian military bases for decades. In order to assess the security risks associated with Russian spent marine fuel, this paper discusses the material attractiveness of spent fuel from all types of Russian marine reactors. The calculations are based on a model of a light water moderated Russian icebreaker reactor. The computer tool HELIOS, used for modelling the reactor and the reactor operations, has been extensively qualified by comparisons with experimental data and international benchmark problems for reactor physics codes as well as through feedback from applications. Some of these benchmarks and studies include fuel enrichments up to 90% in Russian marine reactors. Several fuel data cases are discussed in the paper, focusing especially on: 1) early fuel designs with low initial enrichment; 2) more modern fuel designs used in third and fourth generation of Russian submarines probably with intermediate enriched fuel; and 3) marine fuel with initial enrichment levels close to weapons-grade material. In each case the fuel has been burned until k eff has reached below 1. Case 1) has been evaluated, the calculations made as basis for this paper have concentrated on fuel with

  18. Preserving the global environment: The challenge of shared leadership

    International Nuclear Information System (INIS)

    Matthews, J.T.

    1993-01-01

    This book brings together essays commissioned as background reading for an April 1990 conference on the global environment co-sponsored by the American Assembly and the World Resources Institute. Among the topic areas covered are the following: technical aspects of energy policy and climatic change; harnessing the power of the marketplace; international cooperation; international regulatory regimes; world economic climate; deforestation and species loss; human population growth

  19. G8 Global Partnership: Germany's contribution to strengthening international security

    International Nuclear Information System (INIS)

    Pfaffernoschke, A.

    2013-01-01

    This series of slides presents the German contribution to the G8 Global partnership whose aim is to support specific cooperation projects to address non-proliferation, disarmament, counter-terrorism and nuclear safety issues. 4 priorities have been identified: -) destruction of chemical weapons, -) dismantlement of decommissioned nuclear submarines, -) disposition of fissile materials, and -) employment of former weapon scientists. Today there are 23 donor countries and 2 official recipient countries (Russian Federation and Ukraine). Since the beginning Germany's activities in the G8 Global partnership have focused on chemical weapon destruction (340 million euros), dismantlement of nuclear submarines (600 million euros) and physical protection of nuclear materials (170 million euros). In the Gorny project (1995-2005) German provided the incinerator for the thermal treatment of liquid and solid residues and the equipment for destruction by hydrolysis. Germany's contribution to the following projects: -) the Kambarka project (2003-2007) for the destruction of lewisite, -) the Pochep project (2007-2010) for the destruction of munition containing nerve agents, and -) the Sajda-Bay project for the construction of a long-term storage site for reactor sections of decommissioned submarines, are detailed

  20. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  1. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  2. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  3. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  4. ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

    OpenAIRE

    Asghar, Muhammad Rizwan; Ion, Mihaela; Russello, Giovanni; Crispo, Bruno

    2013-01-01

    Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. There are solutions for preserving confidentiality of data while supporting search on the data stor...

  5. The New Pacific Security Environment: Challenges and Opportunities

    Science.gov (United States)

    1993-01-01

    ECONOMIC COOPERATION 45 Malaysian Prime Minister Mahathir in December 1990. The pro- posed grouping was to be restricted to Asian countries, thus ex...caused the a in the Diet and then was torpedoed by the US Department of State, which did not want a settle- ment and warned that Okinawa may remain...not convene a special session of the National Security Council, but finally, in October 1990, did submit a bill to the Diet calling for the creation

  6. Security issues of cloud computing environment in possible military applications

    OpenAIRE

    Samčović, Andreja B.

    2013-01-01

    The evolution of cloud computing over the past few years is potentially one of major advances in the history of computing and telecommunications. Although there are many benefits of adopting cloud computing, there are also some significant barriers to adoption, security issues being the most important of them. This paper introduces the concept of cloud computing; looks at relevant technologies in cloud computing; takes into account cloud deployment models and some military applications. Addit...

  7. Securing MDSplus in a Multi-organization Environment

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R.; Vega, J.; Pereira, A.; Portas, A. [Asociation Euratom/CIEMAT para Fusion, Madrid (Spain); Fredian, T. [MIT Plasma Science and Fusion Center, Littleton, NH (United States); Purahoo, K. [EURATOM/UKAEA Fusion Association, Abingdon (United Kingdom)

    2009-07-01

    MDSplus has become a real standard de facto data access method in the fusion community. Based on this, it was a priority for EFDA-Federation to integrate this technology as a new service for federated users, providing secure access mechanisms to MDSplus compatible applications. To achieve this, it has been necessary to upgrade MDSplus and make it compatible with PAPI technology, which is currently used as security infrastructure in the EFDA-Federation. Additionally, the included modifications are useful for future integrations in other federation technologies such as Shibboleth. The integration of MDSplus into a federated structure has several benefits. From the service management point of view, there is a simplification of the installation of new MDSplus services in fusion community and its corresponding security management. From the user point of view, the integration of MDSplus into a federated structure has several advantages. The first one is user mobility, which is the possibility of accessing data independently of his client IP address. The second one is a multi-organisation infrastructure, so the user can access data from different organisations that implement MDSplus interface. Finally, single sign on PAPI feature enables users to access to different MDSplus data sources, and other federated services, with just one authentication. This document is composed of a poster and its abstract. (authors)

  8. Securing MDSplus in a multi-organisation environment

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@ciemat.e [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense, 22, 28040 Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense, 22, 28040 Madrid (Spain); Fredian, T. [MIT Plasma Science and Fusion Center, Massachusetts Institute of Technology, NW17-268, 175 Albany Street, Cambridge, MA 02494 (United States); Purahoo, K. [EURATOM/UKAEA Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Pereira, A.; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense, 22, 28040 Madrid (Spain)

    2010-07-15

    MDSplus has become the de facto standard data access method in the fusion community. Based on this, it was a priority for EFDA Federation to integrate this technology as a new service for federated users, providing secure access mechanisms to MDSplus compatible applications. To achieve this, it has been necessary to upgrade MDSplus and make it compatible with PAPI technology, which is currently used as security infrastructure in the EFDA Federation. Additionally, the included modifications are useful for future integrations in other federation technologies such as Shibboleth . The integration of MDSplus into a federated structure has several benefits. From the service management point of view, there is a simplification of the installation of new MDSplus services in fusion community and its corresponding security management. From the user point of view, the integration of MDSplus into a federated structure has several advantages. The first one is user mobility, which is the possibility of accessing data independently of his client IP address. The second one is a multi-organisation infrastructure, so the user can access data from different organisations that implement MDSplus interface. Finally, single sign on PAPI feature enables users to access to different MDSplus data sources, and other federated services, with just one authentication.

  9. WMD Proliferation, Globalization, and International Security: Whither the Nexus and National Security?

    Science.gov (United States)

    2006-07-01

    group Aum Shinrikyo on the Tokyo subway system, which resulted in 10 deaths, is regarded by many as the dawn of the era of modern WMD terrorism...organizations have become truly global in character. Al Qaeda, for example, is franchising operations around the world either directly or indirectly

  10. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  11. EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE

    Directory of Open Access Journals (Sweden)

    W. Xian

    2018-04-01

    Full Text Available According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  12. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    Science.gov (United States)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  13. CHANGE MANAGEMENT STRATEGIES RELATED TO THE GLOBAL ENVIRONMENT COMPLEXITY

    Directory of Open Access Journals (Sweden)

    Elena DOVAL

    2016-12-01

    Full Text Available The changes in organizations appear as a reaction to the organizational environment changes. In order to manage these changes successfully, the managers need to anticipate and design alternative strategies by preparing different options.  Nevertheless, the complexity of the global environment forces the managers to adopt strategies for their organizations that are facilitating the creation of new strategic competences and competitive advantages to face the environmental rapid changes. In this context, this paper is aiming to illustrate the main directions the change management may consider to change the organization strategies in order to harmonize them to the external environment, such as: integration versus externalization, flexible specialization and flexible organization, standardization versus adaptation, market segmentation, relationship building and maintaining and communication integration.  However, the new strategies are based on a changed attitude of the managers towards the competitive advantage that is dynamic and focused on creation rather then to operations.

  14. The evolution, etiology and eventualities of the global health security regime.

    Science.gov (United States)

    Hoffman, Steven J

    2010-11-01

    Attention to global health security governance is more important now than ever before. Scientists predict that a possible influenza pandemic could affect 1.5 billion people, cause up to 150 million deaths and leave US$3 trillion in economic damages. A public health emergency in one country is now only hours away from affecting many others. Using regime analysis from political science, the principles, norms, rules and decision-making procedures by which states govern health security are examined in the historical context of their punctuated evolution. This methodology illuminates the catalytic agents of change, distributional consequences and possible future orders that can help to better inform progress in this area. Four periods of global health security governance are identified. The first is characterized by unilateral quarantine regulations (1377-1851), the second by multiple sanitary conferences (1851-92), the third by several international sanitary conventions and international health organizations (1892-1946) and the fourth by the hegemonic leadership of the World Health Organization (1946-????). This final regime, like others before it, is challenged by globalization (e.g. limitations of the new International Health Regulations), changing diplomacy (e.g. proliferation of global health security organizations), new tools (e.g. global health law, human rights and health diplomacy) and shock-activated vulnerabilities (e.g. bioterrorism and avian/swine influenza). This understanding, in turn, allows us to appreciate the impact of this evolving regime on class, race and gender, as well as to consider four possible future configurations of power, including greater authority for the World Health Organization, a concert of powers, developing countries and civil society organizations. This regime analysis allows us to understand the evolution, etiology and eventualities of the global health security regime, which is essential for national and international health

  15. Food security for Africa: an urgent global challenge

    Directory of Open Access Journals (Sweden)

    Sasson Albert

    2012-04-01

    Full Text Available Abstract In 2012, food insecurity is still a major global concern as 1 billion people are suffering from starvation, under-, and malnutrition, and the Food and Agriculture Organization of the United Nations (FAO has concluded that we are still far from reaching millennium development goal (MDG number 1: to halve extreme poverty and hunger by 2015. In sub-Saharan Africa, the number of people suffering from hunger is estimated at 239 million, and this figure could increase in the near future. There are many examples of food insecurity in sub-Saharan Africa, some of them having reached catastrophic dimensions, for example, in the Horn of Africa or southern Madagascar. Food insecurity is not just about insufficient food production, availability, and intake, it is also about the poor quality or nutritional value of the food. The detrimental situation of women and children is particularly serious, as well as the situation among female teenagers, who receive less food than their male counterparts in the same households. Soaring food prices and food riots are among the many symptoms of the prevailing food crisis and insecurity. Climate change and weather vagaries, present and forecast, are generally compounding food insecurity and drastically changing farming activities, as diagnosed by the Consultative Group on International Agricultural Research (CGIAR in June 2011. The key cause of food insecurity is inadequate food production. Since the global food crisis of 2007–2008, there has been an increasing awareness throughout the world that we must produce more and better food; and we should not be derailed from this goal, despite some relief brought by the good cereal harvests in 2011–2012. This is particularly true in sub-Saharan Africa, which needs and wants to make its own green revolution. The African challenge indeed is key to mitigating food insecurity in the world. Commitments were made by the heads of states and governments of the African Union

  16. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  17. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  18. Satellite Imagery Analysis for Automated Global Food Security Forecasting

    Science.gov (United States)

    Moody, D.; Brumby, S. P.; Chartrand, R.; Keisler, R.; Mathis, M.; Beneke, C. M.; Nicholaeff, D.; Skillman, S.; Warren, M. S.; Poehnelt, J.

    2017-12-01

    The recent computing performance revolution has driven improvements in sensor, communication, and storage technology. Multi-decadal remote sensing datasets at the petabyte scale are now available in commercial clouds, with new satellite constellations generating petabytes/year of daily high-resolution global coverage imagery. Cloud computing and storage, combined with recent advances in machine learning, are enabling understanding of the world at a scale and at a level of detail never before feasible. We present results from an ongoing effort to develop satellite imagery analysis tools that aggregate temporal, spatial, and spectral information and that can scale with the high-rate and dimensionality of imagery being collected. We focus on the problem of monitoring food crop productivity across the Middle East and North Africa, and show how an analysis-ready, multi-sensor data platform enables quick prototyping of satellite imagery analysis algorithms, from land use/land cover classification and natural resource mapping, to yearly and monthly vegetative health change trends at the structural field level.

  19. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  20. Increasing homogeneity in global food supplies and the implications for food security

    NARCIS (Netherlands)

    Khoury, C.K.; Bjorkman, A.D.; Dempewolf, H.; Ramirez-Villegas, J.; Guarino, L.; Jarvis, A.; Rieseberg, L.H.; Struik, P.C.

    2014-01-01

    The narrowing of diversity in crop species contributing to the world’s food supplies has been considered a potential threat to food security. However, changes in this diversity have not been quantified globally. We assess trends over the past 50 y in the richness, abundance, and composition of crop

  1. Transnational legal assemblages and global security law: topologies and temporalities of the list

    NARCIS (Netherlands)

    Sullivan, G.

    2014-01-01

    This article examines the UN 1267 Al-Qaida sanctions regime as a technique of global security listing and form of transnational law with distinct legal ordering processes. Conventional literatures frame these sanctions in formalist terms, flattening their complexity. Understanding their qualities

  2. Survey of Collaboration Technologies in Multi-level Security Environments

    Science.gov (United States)

    2014-04-28

    urban area. It evaluates how municipal fire service, law enforcement, emergency management, and public health organizations have used federal government...heterogeneous operational environments. Mercado , A. (2008) Exploring Data Sharing Between Geographically Distributed Mobile and Fixed Nodes Supporting

  3. A Cluster-Based Framework for the Security of Medical Sensor Environments

    Science.gov (United States)

    Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos

    The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.

  4. A secure online image trading system for untrusted cloud environments.

    Science.gov (United States)

    Munadi, Khairul; Arnia, Fitri; Syaryadhi, Mohd; Fujiyoshi, Masaaki; Kiya, Hitoshi

    2015-01-01

    In conventional image trading systems, images are usually stored unprotected on a server, rendering them vulnerable to untrusted server providers and malicious intruders. This paper proposes a conceptual image trading framework that enables secure storage and retrieval over Internet services. The process involves three parties: an image publisher, a server provider, and an image buyer. The aim is to facilitate secure storage and retrieval of original images for commercial transactions, while preventing untrusted server providers and unauthorized users from gaining access to true contents. The framework exploits the Discrete Cosine Transform (DCT) coefficients and the moment invariants of images. Original images are visually protected in the DCT domain, and stored on a repository server. Small representation of the original images, called thumbnails, are generated and made publicly accessible for browsing. When a buyer is interested in a thumbnail, he/she sends a query to retrieve the visually protected image. The thumbnails and protected images are matched using the DC component of the DCT coefficients and the moment invariant feature. After the matching process, the server returns the corresponding protected image to the buyer. However, the image remains visually protected unless a key is granted. Our target application is the online market, where publishers sell their stock images over the Internet using public cloud servers.

  5. Secure Virtualization Environment Based on Advanced Memory Introspection

    Directory of Open Access Journals (Sweden)

    Shuhui Zhang

    2018-01-01

    Full Text Available Most existing virtual machine introspection (VMI technologies analyze the status of a target virtual machine under the assumption that the operating system (OS version and kernel structure information are known at the hypervisor level. In this paper, we propose a model of virtual machine (VM security monitoring based on memory introspection. Using a hardware-based approach to acquire the physical memory of the host machine in real time, the security of the host machine and VM can be diagnosed. Furthermore, a novel approach for VM memory forensics based on the virtual machine control structure (VMCS is put forward. By analyzing the memory of the host machine, the running VMs can be detected and their high-level semantic information can be reconstructed. Then, malicious activity in the VMs can be identified in a timely manner. Moreover, by mutually analyzing the memory content of the host machine and VMs, VM escape may be detected. Compared with previous memory introspection technologies, our solution can automatically reconstruct the comprehensive running state of a target VM without any prior knowledge and is strongly resistant to attacks with high reliability. We developed a prototype system called the VEDefender. Experimental results indicate that our system can handle the VMs of mainstream Linux and Windows OS versions with high efficiency and does not influence the performance of the host machine and VMs.

  6. Radiation and global environment. Consideration for the influence on ecosystems

    International Nuclear Information System (INIS)

    Muramatsu, Yasuyuki; Doi, Masahiro; Yoshida, Satoshi

    2003-09-01

    This book is based on presentations at the National Institute of Radiological Sciences (NIRS) symposium of the same title held by the NIRS Research Center for Radiation Safety in December, 2002, is edited with somehow enlightening intention as well, and is composed from 6 parts of; 1. Reasons for concern for influence on ecosystems, 2. Behavior of substances in ecosystems, 3. Changes of global environments and life, 4. Various environmental stresses and living/eco-systems, 5. New development of evaluation studies on radiation effects, and 6. For the radiation protection of environments. The 1st part involves 3 chapters concerning studies on effects on ecosystems and radiation protection of environments; 2nd part, 4 chapters concerning behavior of radioactive and/or stable cesium and iodine in forest and environmental microorganisms, and behavior and effects of acidic substances; 3rd part, 2 chapters concerning terrestrial history and evolution/adaptation of livings; 4th part, 5 chapters concerning radiation stress, active oxygen, radiodurance/radio-resistant microorganisms, ultraviolet, and environmental hormones; 5th part, 6 chapters concerning effects on cells of environmental toxic substance and radiation, environmental stress evaluation by DNA micro-array, effects on taxis, use of microcosm, simulation of computational model ecosystem, and aquatic ecosystems; 6th part, 5 chapters concerning environmental radioecology, safety measures in high-level radioactive waste disposal under the ground, radiation protection of environments from radiation biology aspect, effects of chemicals, and aspect and strategy for radiation effects on environments. (N.I.)

  7. Critical perspectives on changing media environments in the Global South

    DEFF Research Database (Denmark)

    Nielsen, Poul Erik

    the changes in the media landscape continuously alter the power balance between state, civil society and market. At the meso level, these changes will be discussed in relation to the development of the different media and of a variety of new locally specific media environments, which create new spaces......The main aim of this article is to give a general overview and theoretically discuss how significant changes in the media landscapes in Global South countries alter existing spaces and create new spaces for political and socio-cultural exchange, thus changing the complex interrelationship between...... media and society. Knowing that media is only one of many aspects in current societal changes, the focus will be more on the interrelationship between media and society and less on other aspects like globalization, education and political reforms. At the macro level, the article will discuss how...

  8. US Centers for Disease Control and Prevention and Its Partners' Contributions to Global Health Security.

    Science.gov (United States)

    Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca

    2017-12-01

    To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.

  9. Exploiting coalbed methane and protecting the global environment

    Energy Technology Data Exchange (ETDEWEB)

    Yuheng, Gao

    1996-12-31

    The global climate change caused by greenhouse gases (GHGs) emission has received wide attention from all countries in the world. Global environmental protection as a common problem has confronted the human being. As a main component of coalbed methane, methane is an important factor influencing the production safety of coal mine and threatens the lives of miners. The recent research on environment science shows that methane is a very harmful GHG. Although methane gas has very little proportion in the GHGs emission and its stayed period is also very short, it has very obvious impact on the climate change. From the estimation, methane emission in the coal-mining process is only 10% of the total emission from human`s activities. As a clean energy, Methane has mature recovery technique before, during and after the process of mining. Thus, coalbed methane is the sole GHG generated in the human`s activities and being possible to be reclaimed and utilized. Compared with the global greenhouse effect of other GHGs emission abatement, coalbed methane emission abatement can be done in very low cost with many other benefits: (1) to protect global environment; (2) to improve obviously the safety of coal mine; and (3) to obtain a new kind of clean energy. Coal is the main energy in China, and coalbed contains very rich methane. According to the exploration result in recent years, about 30000{approximately}35000 billion m{sup 2} methane is contained in the coalbed below 2000 m in depth. China has formed a good development base in the field of reclamation and utilization of coalbed methane. The author hopes that wider international technical exchange and cooperation in the field will be carried out.

  10. Global citizenship is key to securing global health: the role of higher education.

    Science.gov (United States)

    Stoner, Lee; Perry, Lane; Wadsworth, Daniel; Stoner, Krystina R; Tarrant, Michael A

    2014-07-01

    Despite growing public awareness, health systems are struggling under the escalating burden of non-communicable diseases. While personal responsibility is crucial, alone it is insufficient. We argue that one must place themselves within the broader/global context to begin to truly understand the health implications of personal choices. Global citizenship competency has become an integral part of the higher education discourse; this discourse can and should be extended to include global health. A global citizen is someone who is (1) aware of global issues, (2) socially responsible, and (3) civically engaged. From this perspective, personal health is not solely an individual, self-serving act; rather, the consequences of our lifestyle choices and behaviors have far-reaching implications. This paper will argue that, through consciously identifying global health within the constructs of global citizenship, institutions of higher education can play an instrumental role in fostering civically engaged students capable of driving social change. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Helen H [Los Alamos National Laboratory

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  12. Tourism, globalization and the environment in the Mexican Caribbean Coast

    Directory of Open Access Journals (Sweden)

    Juan Córdoba y Ordóñez

    2012-02-01

    Full Text Available The terms globalization and tourism tend to be regarded as synonyms in the Mexican Caribbean, an area which shifted from a virtually uninhabited borderline territory to a tourism center receiving over six million visitors peryear. Territorial occupation patterns derived from tourism -identified during field work through a physiognomic analysiswere used to investigate some of the implications of the complex relationship between tourism and development, the latter including not only economic but human factors, as well as with the natural and cultural environment characterized by both a great diversity and a great fragility.

  13. Aspects regarding the security environment in South Caucasus

    Directory of Open Access Journals (Sweden)

    Lavinia Lupu

    2012-08-01

    Full Text Available Transitions from Soviet authoritarianism and planned economies to democracy and market economies have not been successfully completed in any of the three states from South Caucasus. This region continues to be characterized by high instability and insecurity due the absence of solutions to the protracted or „frozen” conflicts between Armenia and Azerbaijan – over the territory of Nagorno-Karabakh – and between Georgia and Russia – over the breakaway regions of South Ossetia and Abkhazia. Finding common ground upon which all parties can agree has proven to be an impossible task. Protracted or „frozen” conflicts present a challenge for the stability and security of South Caucasus.

  14. Secure Cooperative Data Access in Multi-Cloud Environment

    Science.gov (United States)

    Le, Meixing

    2013-01-01

    In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…

  15. The Influence of Globalization on the Change and Convergence of Social Security Transfer: An Empirical Analysis for OECD Counties

    Directory of Open Access Journals (Sweden)

    Jinyoung Hwang

    2007-12-01

    Full Text Available Using a cross-section of OECD countries, this paper examines the relationship between globalization and the change and convergence of social security transfer. Globalization has arguably had a profound impact on the use of social protection in states, since it is normally accompanied with increases in income inequality, polarization, and unemployment. In addition, globalization may lead to socio- economic policy harmonization across countries. The empirical results show that there exists a significant and positive relationship between social security transfer in GDP and the globalization index based on political, economic, and social integrations. Also, we found the convergence phenomenon of social security transfer in OECD countries, applying the traditional methodology of convergence and convergence. Therefore, there is evidence in OECD countries that globalization indirectly affects the convergence of social security transfer in addition to direct relation to social security transfer in GDP.

  16. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    Science.gov (United States)

    2017-12-01

    Related Information to Protect the Homeland (GAO 15- 290) (Washington, DC: U.S. Government Accountability Office, 2015), http://www.gao.gov/ assets...Government Accountability Office [GAO], Information Sharing Environment Better Road Map Needed to Guide Implementation and Investments (GAO-11-455...and its ISE PM would have clearer accountability for information sharing lapses and a faster ability to reform or develop domestic information -sharing

  17. Water dependency and water exploitation at global scale as indicators of water security

    Science.gov (United States)

    De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.

    2015-12-01

    A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.

  18. Secure Hardware Performance Analysis in Virtualized Cloud Environment

    Directory of Open Access Journals (Sweden)

    Chee-Heng Tan

    2013-01-01

    Full Text Available The main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data for diagnostic and remediation purposes. The proposed mechanisms utilized TPC-H benchmark to achieve 2 objectives. First, the underlying hardware performance and consistency is supervised via a control system, which is constructed using a combination of TPC-H queries, linear regression, and machine learning techniques. Second, linear programming techniques are employed to provide input to the algorithms that construct stress-testing scenarios in the virtual machine, using the combination of TPC-H queries. These stress-testing scenarios serve 2 purposes. They provide the boundary resource threshold verification to the first control system, so that periodic training of the synthetic data sets for performance evaluation is not constrained by hardware inadequacy, particularly when the resources in the virtual machine are scaled up or down which results in the change of the utilization threshold. Secondly, they provide a platform for response time verification on critical transactions, so that the expected Quality of Service (QoS from these transactions is assured.

  19. IoT Privacy and Security Challenges for Smart Home Environments

    OpenAIRE

    Huichen Lin; Neil W. Bergmann

    2016-01-01

    Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic enviro...

  20. Subterranean karst environments as a global sink for atmospheric methane

    Science.gov (United States)

    Webster, Kevin D.; Drobniak, Agnieszka; Etiope, Giuseppe; Mastalerz, Maria; Sauer, Peter E.; Schimmelmann, Arndt

    2018-03-01

    The air in subterranean karst cavities is often depleted in methane (CH4) relative to the atmosphere. Karst is considered a potential sink for the atmospheric greenhouse gas CH4 because its subsurface drainage networks and solution-enlarged fractures facilitate atmospheric exchange. Karst landscapes cover about 14% of earth's continental surface, but observations of CH4 concentrations in cave air are limited to localized studies in Gibraltar, Spain, Indiana (USA), Vietnam, Australia, and by incomplete isotopic data. To test if karst is acting as a global CH4 sink, we measured the CH4 concentrations, δ13CCH4, and δ2HCH4 values of cave air from 33 caves in the USA and three caves in New Zealand. We also measured CO2 concentrations, δ13CCO2, and radon (Rn) concentrations to support CH4 data interpretation by assessing cave air residence times and mixing processes. Among these caves, 35 exhibited subatmospheric CH4 concentrations in at least one location compared to their local atmospheric backgrounds. CH4 concentrations, δ13CCH4, and δ2HCH4 values suggest that microbial methanotrophy within caves is the primary CH4 consumption mechanism. Only 5 locations from 3 caves showed elevated CH4 concentrations compared to the atmospheric background and could be ascribed to local CH4 sources from sewage and outgassing swamp water. Several associated δ13CCH4 and δ2HCH4 values point to carbonate reduction and acetate fermentation as biochemical pathways of limited methanogenesis in karst environments and suggest that these pathways occur in the environment over large spatial scales. Our data show that karst environments function as a global CH4 sink.

  1. Secure Software Configuration Management Processes for nuclear safety software development environment

    International Nuclear Information System (INIS)

    Chou, I.-Hsin

    2011-01-01

    Highlights: → The proposed method emphasizes platform-independent security processes. → A hybrid process based on the nuclear SCM and security regulations is proposed. → Detailed descriptions and Process Flow Diagram are useful for software developers. - Abstract: The main difference between nuclear and generic software is that the risk factor is infinitely greater in nuclear software - if there is a malfunction in the safety system, it can result in significant economic loss, physical damage or threat to human life. However, secure software development environment have often been ignored in the nuclear industry. In response to the terrorist attacks on September 11, 2001, the US Nuclear Regulatory Commission (USNRC) revised the Regulatory Guide (RG 1.152-2006) 'Criteria for use of computers in safety systems of nuclear power plants' to provide specific security guidance throughout the software development life cycle. Software Configuration Management (SCM) is an essential discipline in the software development environment. SCM involves identifying configuration items, controlling changes to those items, and maintaining integrity and traceability of them. For securing the nuclear safety software, this paper proposes a Secure SCM Processes (S 2 CMP) which infuses regulatory security requirements into proposed SCM processes. Furthermore, a Process Flow Diagram (PFD) is adopted to describe S 2 CMP, which is intended to enhance the communication between regulators and developers.

  2. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  3. Operating Security System Support for Run-Time Security with a Trusted Execution Environment

    DEFF Research Database (Denmark)

    Gonzalez, Javier

    Software services have become an integral part of our daily life. Cyber-attacks have thus become a problem of increasing importance not only for the IT industry, but for society at large. A way to contain cyber-attacks is to guarantee the integrity of IT systems at run-time. Put differently......, it is safe to assume that any complex software is compromised. The problem is then to monitor and contain it when it executes in order to protect sensitive data and other sensitive assets. To really have an impact, any solution to this problem should be integrated in commodity operating systems...... sensitive assets at run-time that we denote split-enforcement, and provide an implementation for ARM-powered devices using ARM TrustZone security extensions. We design, build, and evaluate a prototype Trusted Cell that provides trusted services. We also present the first generic TrustZone driver...

  4. Nuclear Security Education in “non-Nuclear” Countries – Inseparable Component of Global Nuclear Security Scheme. Example of Montenegro

    International Nuclear Information System (INIS)

    Jovanovic, S.

    2014-01-01

    Global regime of nuclear security cannot be complete and functional if all countries are not involved; • Apart from the fact that developed nuclear countries are crucial in this sense (and determining the system), due attention should be paid to small, developing, “nonnuclear” ones; • Small problems in big countries are often big problems in small countries – so it is with HRD in nuclear related fields; • Everything is based on competence, with education being fundamental for building it up; • To that aim, the role of universities is of utmost importance, while networking is another corner stone; • Experience of Montenegro, perhaps exemplary in the above context, is discussed. (author)

  5. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    Science.gov (United States)

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  6. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Sudha Devi Dorairaj

    2015-01-01

    Full Text Available Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

  7. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment

    Science.gov (United States)

    Dorairaj, Sudha Devi; Kaliannan, Thilagavathy

    2015-01-01

    Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165

  8. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment.

    Science.gov (United States)

    Dorairaj, Sudha Devi; Kaliannan, Thilagavathy

    2015-01-01

    Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

  9. Global health security: the wider lessons from the west African Ebola virus disease epidemic

    Science.gov (United States)

    Heymann, David L; Chen, Lincoln; Takemi, Keizo; Fidler, David P; Tappero, Jordan W; Thomas, Mathew J; Kenyon, Thomas A; Frieden, Thomas R; Yach, Derek; Nishtar, Sania; Kalache, Alex; Olliaro, Piero L; Horby, Peter; Torreele, Els; Gostin, Lawrence O; Ndomondo-Sigonda, Margareth; Carpenter, Daniel; Rushton, Simon; Lillywhite, Louis; Devkota, Bhimsen; Koser, Khalid; Yates, Rob; Dhillon, Ranu S; Rannan-Eliya, Ravi P

    2018-01-01

    The Ebola virus disease outbreak in West Africa was unprecedented in both its scale and impact. Out of this human calamity has come renewed attention to global health security—its definition, meaning, and the practical implications for programmes and policy. For example, how does a government begin to strengthen its core public health capacities, as demanded by the International Health Regulations? What counts as a global health security concern? In the context of the governance of global health, including WHO reform, it will be important to distil lessons learned from the Ebola outbreak. The Lancet invited a group of respected global health practitioners to reflect on these lessons, to explore the idea of global health security, and to offer suggestions for next steps. Their contributions describe some of the major threats to individual and collective human health, as well as the values and recommendations that should be considered to counteract such threats in the future. Many different perspectives are proposed. Their common goal is a more sustainable and resilient society for human health and wellbeing. PMID:25987157

  10. Food security, agricultural subsidies, energy, and the environment: a process of 'glocalization' in Sri Lanka

    Energy Technology Data Exchange (ETDEWEB)

    Mendis, P.

    2001-07-01

    This paper analyzes the interplay of policy dilemma in the areas of food security, agricultural subsidies, energy consumption, and the environment in the 'glocalization' process of Sri Lanka. It demonstrates that the domestic agricultural and food sector is intricately interconnected with the global economy and world market forces. While this paper gives a primary focus on domestic rice production and wheat import policies, it further examines the environmental consequences and public health issues that are associated with the process of 'glocalization' as part of globalization. This 'glocalization' has led to a series of intended and unintended externalities for Sri Lanka whose economic integration is irreversibly linked to agricultural and subsidy policies of other food exporting and producing countries of Asia and the United States. (author)

  11. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  12. Global Hotspots of Conflict Risk between Food Security and Biodiversity Conservation

    OpenAIRE

    Molotoks, Amy; Dawson, Terence Peter

    2017-01-01

    The global challenges of food security and biodiversity are rarely addressed together, though recently there has been an increasing awareness that the two issues are closely related. The majority of land available for agriculture is already used for food production, but despite the productivity gains, one in nine people worldwide are classified as food insecure. There is an increasing risk that addressing food insecurity through methods such as agricultural expansion orintensification could l...

  13. The NPT regime, present and future global security: an American view

    International Nuclear Information System (INIS)

    Thompson, Sam.

    1987-01-01

    Although not perfect, an international non-proliferation regime as set out by the IAEA and Non-Proliferation Treaty is in existence. The history of the involvement of the United States in the development of this regime is mentioned as a background to explaining the current approach of the Reagan Administration to non-proliferation. Trends and challenges which may affect future global security are then identified and discussed. The author is optimistic about the future. (U.K.)

  14. Energy Security and Economics of Indian Biofuel Strategy in a Global Context

    OpenAIRE

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur; Baka, Jenn

    2011-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for climate change mitigation and greater energy security for many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks - global warming pollution and negative economic impacts of oil price hikes. This paper examines India's options for managing energy price risk ...

  15. THE FACTOR OF ENERGY-INFORMATION SECURITY IN THE FRAMEWORK OF GLOBAL CIVILIZATION-RELATED CHANGES

    OpenAIRE

    Alexey Viktorovich SUHORUKHIH

    2015-01-01

    The paper examined the grounds having involved global social and cultural changes, and emphasized the precedence taken by an energy-information component to the geopolitical dynamics of the civilization continuum. The study emphasized the relevance of new facets in social and cultural insight urged to respond to challenges of direct mental hazards emerging over the world, and requirement of energy-information security the civilization has sought for, assumed to be the framework for considerin...

  16. China, India, South Africa, Brazil (BASIC): Crucial for the global environment

    International Nuclear Information System (INIS)

    2011-01-01

    The rising importance of the BASIC countries in a changing world Over the last decade the emerging economies have become increasingly important for the development of the global economy. This trend was reinforced by the global financial crisis which hit the developed economies the hardest, and after which the emerging economies emerged as crucial growth centres in the global economy. We are entering into a new era in global politics, and a broad process is currently taking place of restructuring global institutions and political processes to increasingly take into account the interests of the emerging economies. A global environmental crisis constitutes the backdrop for this change in global politics, as the current volume of production and consumption of the planets renewable resources (including the capacity to absorb greenhouse gas emissions) is beyond the planets regenerative capacity. The breakdown of the Doha Development Round in World Trade, the creation of the BRIC group and the G20, the emergence of the BASIC group of key emerging economies and the following developments under the UN Framework Convention on Climate Change, all testify to the fact that China, India, South Africa and Brazil (BASIC) today have a decisive and increasing influence in world politics. With regards to the environment, this means that BASIC countries increasingly will set environmental standards in global markets as their economies to a greater extent come to represent global buying power, increasingly will influence to what extent environmental concerns are mainstreamed into international agreements (such as WTO) in general, and also will decide the scope and level of ambition and scope of international environmental agreements (as we see in UNFCCC). Among the emerging economies China, India, South Africa, and Brazil stand out as particularly important. China and India alone represent more than 35 per cent of the global population and are the most rapidly growing economies in the

  17. China, India, South Africa, Brazil (BASIC): Crucial for the global environment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    The rising importance of the BASIC countries in a changing world Over the last decade the emerging economies have become increasingly important for the development of the global economy. This trend was reinforced by the global financial crisis which hit the developed economies the hardest, and after which the emerging economies emerged as crucial growth centres in the global economy. We are entering into a new era in global politics, and a broad process is currently taking place of restructuring global institutions and political processes to increasingly take into account the interests of the emerging economies. A global environmental crisis constitutes the backdrop for this change in global politics, as the current volume of production and consumption of the planets renewable resources (including the capacity to absorb greenhouse gas emissions) is beyond the planets regenerative capacity. The breakdown of the Doha Development Round in World Trade, the creation of the BRIC group and the G20, the emergence of the BASIC group of key emerging economies and the following developments under the UN Framework Convention on Climate Change, all testify to the fact that China, India, South Africa and Brazil (BASIC) today have a decisive and increasing influence in world politics. With regards to the environment, this means that BASIC countries increasingly will set environmental standards in global markets as their economies to a greater extent come to represent global buying power, increasingly will influence to what extent environmental concerns are mainstreamed into international agreements (such as WTO) in general, and also will decide the scope and level of ambition and scope of international environmental agreements (as we see in UNFCCC). Among the emerging economies China, India, South Africa, and Brazil stand out as particularly important. China and India alone represent more than 35 per cent of the global population and are the most rapidly growing economies in the

  18. Ensuring the Security of the Educational Environment: Cases of US, Russia and Europe

    Directory of Open Access Journals (Sweden)

    Vitaly V. Kabernik

    2015-01-01

    Full Text Available The article deals with security, including informational, educational environment. The article considers experience of the United States and Europe, including specific examples. Given a classification of the major threats and they are allocated on the basis of foreign and domestic experience. The article also determines the range of problems actually facing educational institutions and regularly described in special reports on the subject. Provides an overview of a set of measures designed to regulate access to inappropriate content, with special attention given to the phenomenon of social networks that put new challenges in ensuring security of the educational environment.

  19. Operating nuclear power stations in a regulated cyber security environment: a roadmap for success

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E., E-mail: Erik.Dorman@areva.com [AREVA Inc., Cyber Security Solutions, Charlotte, NC (United States)

    2015-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)

  20. Operating nuclear power stations in a regulated cyber security environment: a roadmap for success

    International Nuclear Information System (INIS)

    Dorman, E.

    2015-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)

  1. Achieving sustainable irrigation water withdrawals: global impacts on food security and land use

    Science.gov (United States)

    Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve

    2017-10-01

    Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.

  2. Strengthening global health security by embedding the International Health Regulations requirements into national health systems.

    Science.gov (United States)

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.

  3. The future of the global environment. A model-based analysis supporting UNEP's first global environment outlook

    International Nuclear Information System (INIS)

    Bakkes, J.; Van Woerden, J.; Alcamo, J.; Berk, M.; Bol, P.; Van den Born, G.J.; Ten Brink, B.; Hettelingh, J.P.; Niessen, L.; Langeweg, F.; Swart, R.

    1997-01-01

    Integrated assessments in support of environmental policy have been applied to a number of countries and regions, and to international negotiations. UNEP's first Global Environment Outlook (GEO-1) can be seen as a step towards making the tool of integrated assessment more widely available as a means for focusing action. This technical report documents RIVM's contribution to the GEO-1 report, focusing on the subject 'looking ahead'. It is illustrated that a 'what if' analysis helps to look beyond the delays in environmental and resource processes. This report illustrates that integrated assessment and modelling techniques can be excellent tools for environment and development policy-setting. The methodology, however, will need to be further developed and adapted to the realities and expectations of diverse regions, incorporating alternative policy strategies and development scenarios. This report focuses primarily on the period 1970-2015, because reliable historical data are often only generally available from 1970 onwards and the year 2015 is believed to match the time perspective of decision-makers. The findings of the analysis are reported in terms of six regions, corresponding with the division of the UNEP regional offices. Questions asked are: how will socioeconomic driving forces affect freshwater and land resources, and how will these changes mutually interact, and why are these changes important for society? Chapter 2 deals with the development of the social and economic driving forces. In the Chapters 3 and 4 it is discussed how this pressure influences selected aspects of the environment. Chapter 3 alone addresses the importance of selected elements of the interacting global element cycles for environmental quality, while Chapter 4 addresses land resources, their potential for food production and associated dependence on freshwater resources. The impacts on selected components of natural areas (Chapter 5) and society (Chapter 6) are subsequently addressed

  4. DEGAS: Dynamic Exascale Global Address Space Programming Environments

    Energy Technology Data Exchange (ETDEWEB)

    Demmel, James [Univ. of California, Berkeley, CA (United States)

    2018-02-23

    The Dynamic, Exascale Global Address Space programming environment (DEGAS) project will develop the next generation of programming models and runtime systems to meet the challenges of Exascale computing. The Berkeley part of the project concentrated on communication-optimal code generation to optimize speed and energy efficiency by reducing data movement. Our work developed communication lower bounds, and/or communication avoiding algorithms (that either meet the lower bound, or do much less communication than their conventional counterparts) for a variety of algorithms, including linear algebra, machine learning and genomics. The Berkeley part of the project concentrated on communication-optimal code generation to optimize speed and energy efficiency by reducing data movement. Our work developed communication lower bounds, and/or communication avoiding algorithms (that either meet the lower bound, or do much less communication than their conventional counterparts) for a variety of algorithms, including linear algebra, machine learning and genomics.

  5. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  6. Declining global per capita agricultural production and warming oceans threaten food security

    Science.gov (United States)

    Funk, Christopher C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that is grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be determined by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices and policies. This paper discusses several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14% between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21st century food availability in some countries by disrupting moisture transports and bringing down dry air over crop growing areas. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced rainfall during the main growing season along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, this study presents an analysis of emerging

  7. Declining Global Per Capita Agricultural Production and Warming Oceans Threaten Food Security

    Science.gov (United States)

    Funk, Chris C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that was grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be controlled by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices, and policies. In this paper we discuss several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia, and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14 percent between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21 st century food availability by disrupting Indian Ocean moisture transports and tilting the 21 st century climate toward a more El Nino-like state. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced main growing season rainfall along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, we present an analysis of

  8. The Worldviews Network: Transformative Global Change Education in Immersive Environments

    Science.gov (United States)

    Hamilton, H.; Yu, K. C.; Gardiner, N.; McConville, D.; Connolly, R.; "Irving, Lindsay", L. S.

    2011-12-01

    Our modern age is defined by an astounding capacity to generate scientific information. From DNA to dark matter, human ingenuity and technologies create an endless stream of data about ourselves and the world of which we are a part. Yet we largely founder in transforming information into understanding, and understanding into rational action for our society as a whole. Earth and biodiversity scientists are especially frustrated by this impasse because the data they gather often point to a clash between Earth's capacity to sustain life and the decisions that humans make to garner the planet's resources. Immersive virtual environments offer an underexplored link in the translation of scientific data into public understanding, dialogue, and action. The Worldviews Network is a collaboration of scientists, artists, and educators focused on developing best practices for the use of immersive environments for science-based ecological literacy education. A central tenet of the Worldviews Network is that there are multiple ways to know and experience the world, so we are developing scientifically accurate, geographically relevant, and culturally appropriate programming to promote ecological literacy within informal science education programs across the United States. The goal of Worldviews Network is to offer transformative learning experiences, in which participants are guided on a process integrating immersive visual explorations, critical reflection and dialogue, and design-oriented approaches to action - or more simply, seeing, knowing, and doing. Our methods center on live presentations, interactive scientific visualizations, and sustainability dialogues hosted at informal science institutions. Our approach uses datasets from the life, Earth, and space sciences to illuminate the complex conditions that support life on earth and the ways in which ecological systems interact. We are leveraging scientific data from federal agencies, non-governmental organizations, and our

  9. Design research and the globalization of healthcare environments.

    Science.gov (United States)

    Shepley, Mardelle McCuskey; Song, Yilin

    2014-01-01

    Global healthcare practice has expanded in the past 20 years. At the same time the incorporation of research into the design process has gained prominence as a best practice among architects. The authors of this study investigated the status of design research in a variety of international settings. We intended to answer the question, "how pervasive is healthcare design research outside of the United States?" The authors reviewed the international literature on the design of healthcare facilities. More than 500 international studies and conference proceedings were incorporated in this literature review. A team of five research assistants searched multiple databases comparing approximately 16 keywords to geographic location. Some of those keywords included: evidence-based design, salutogenic design, design research, and healthcare environment. Additional articles were gathered by contacting prominent researchers and asking for their personal assessment of local health design research studies. While there are design researchers in most parts of the world, the majority of studies focus on the needs of populations in developed countries and generate guidelines that have significant cost and cultural implications that prohibit their implementation in developing countries. Additionally, the body of literature discussing the role of culture in healthcare environments is extremely limited. Design researchers must address the cultural implications of their studies. Additionally, we need to expand our research objectives to address healthcare design in countries that have not been previous considered. © 2014 Vendome Group, LLC.

  10. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and other weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the

  11. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    International Nuclear Information System (INIS)

    Pilat, Joseph F.

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and other weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the vision of a

  12. The Fukushima nuclear accident and its effect on global energy security

    International Nuclear Information System (INIS)

    Hayashi, Masatsugu; Hughes, Larry

    2013-01-01

    The March 2011 nuclear accident at the Fukushima Daiichi nuclear power station affected both short- and long-term energy-security in Japan, resulting in crisis-driven, ad hoc energy policy and, because of the decision to shutter all nuclear reactors, increased the country’s demand for fossil fuels, primarily natural gas. However, the effects of the accident on energy security were not restricted to Japan; for example, the worldwide availability and affordability of liquefied natural gas were affected by Japan’s increased demand; while the accident itself resulted in the loss of public acceptability of nuclear power and led countries, such as Germany and Italy, to immediately shut down some of the nuclear reactors or abandon plans to build new ones. This paper examines some of the short-term effects on global energy security following the accident at Fukushima, focusing on the main replacement fuel, liquefied natural gas. It shows, amongst other things, that the accident increased investment in liquefied natural gas projects around the world. The paper shows that despite Fukushima contributing to nuclear power’s loss of acceptability in most developed countries, it is still seen as an essential way of improving energy security in many countries and, despite what its critics may say, will probably continue to be used as a significant source of low-carbon electricity. - Highlights: ► Japan’s demands for fossil fuels raised the price of LNG and low-sulfur crudes. ► The accident affected the global price of uranium and producer share prices. ► The accident accelerated foreign-direct investment in LNG projects worldwide. ► The change in public perception toward nuclear power was relatively limited. ► A radical shift in global nuclear policy seems to be unrealistic after Fukushima

  13. Designing a Secure Exam Management System (SEMS) for M-Learning Environments

    Science.gov (United States)

    Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc

    2016-01-01

    M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…

  14. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    Science.gov (United States)

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  15. Open and Distance Education in Global Environment: Opportunities for Collaboration

    Directory of Open Access Journals (Sweden)

    S. K. PULIST

    2007-01-01

    Full Text Available Distance education system in India has undergone many stages and phases of evolution before it really reached the stage of what is called open education, ICT-enabled education and global education. During these phases, it has assimilated different aspects of ICT with all applauds and has been able to go hand-in-hand with it transcending the national and regional boundaries. The distance education institutions have now started giving a serious thought to explore the possibility of cross-boarder expansion. The educational needs of the present society are changing very fast. The education is now being seen as an enabling tool for empowerment and all-round development of individuals. It is difficult for an institution to come up to all the educational requirements of the society. It is, therefore, time to collaborate rather than compete. Quality concern becomes a serious issue in such a situation. Consequently, globalization, internationalization, collaboration, networking have become the buzzwords of the day in distance education. In furtherance of this journey, Indira National Open University, INDIA organized an international conference on the theme “Open and Distance Education in Global Environment: Opportunities for Collaboration” under the aegis of International Council for Distance Education. The articles of the renowned educationists presented in the Conference have reserved their place in the volume under review. The volume is a repository of their experiences in the becoming of distance education all these years. The volume is spread over 32 chapters summed up into four major streams– internationalization are: collaboration and networking; ICT-enabled education; quality assurance; and distance education for development. The canvas of the volume covers the present scenario of open and distance education from the global perspective.The first part discusses as to how collaboration can be tamed to develop joint curriculum and deliver

  16. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  17. Global Food Security-support data at 30 m (GFSAD30)

    Science.gov (United States)

    Thenkabail, P. S.

    2013-12-01

    Monitoring global croplands (GCs) is imperative for ensuring sustainable water and food security to the people of the world in the Twenty-first Century. However, the currently available cropland products suffer from major limitations such as: (1) Absence of precise spatial location of the cropped areas; (b) Coarse resolution nature of the map products with significant uncertainties in areas, locations, and detail; (b) Uncertainties in differentiating irrigated areas from rainfed areas; (c) Absence of crop types and cropping intensities; and (e) Absence of a dedicated webdata portal for the dissemination of cropland products. Therefore, our project aims to close these gaps through a Global Food Security-support data at 30 m (GFSAD30) with 4 distinct products: 1. Cropland extentarea, 2. Crop types with focus on 8 crops that occupy 70% of the global cropland areas, 3. Irrigated versus rainfed, and 4. Cropping intensities: single, double, triple, and continuous cropping. The above 4 products will be generated for GFSAD for nominal year 2010 (GFSAD2010) based on Landsat 30m Global Land Survey 2010 (GLS2010) fused with Moderate Resolution Imaging Spectroradiometer (MODIS) 250m NDVI monthly maximum value composites (MVC) of 2009-2011 data, and suite of secondary data (e.g., long-term precipitation, temperature, GDEM elevation). GFSAD30 will be produced using three mature cropland mapping algorithms (CMAs): 1. Spectral matching techniques; 2. A cropland classification algorithm (ACCA) that is rule-based; and 3. Hierarchical segmentation (HSeg) algorithm. Funded by NASA MEaSUREs, GFSAD30 will make significant contributions to Earth System Data Records (ESDRs), Group on Earth Observations (GEO) Agriculture and Water Societal Beneficial Areas (GEO Ag. SBAs), GEO Global Agricultural Monitoring Initiative (GEO GLAM), and the recent 'Big Data' initiative by the White House. The project has the support of USGS Working Group on Global Croplands (https://powellcenter.usgs.gov/globalcroplandwater/).

  18. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  19. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  20. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  1. ICT security curriculum or how to respond to current global challenges

    Directory of Open Access Journals (Sweden)

    Marian Silviu Poboroniuc

    2017-01-01

    Full Text Available The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions. The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and Information Engineering (EIE education within Europe, especially in relation to modern global technical challenges and to provide higher education models in a few EIE fields in accordance with these challenges. One of the outcomes of the project was a new ICT (Information and Computer Technology Security curriculum for bachelor and master levels. The research methodology comprised such stages as: identifying the most important current global challenges, conducting a survey related to existing EIE programs in order to establish the top-level criteria for an EIE curriculum, analyzing the results of the survey, obtaining the industry feedback related to technical and non-technical skills required for the specific field, and proposing a new curriculum for ICT Security programmes to respond to the modern technical challenges and to meet the needs of the industry, students, academics and graduates. As future work we will focus on stakeholder assessment in the EIE field and, based on the resulting feedback, on improving the ICT Security curriculum.

  2. Rising food costs & global food security: Key issues & relevance for India

    Science.gov (United States)

    Gustafson, Daniel J.

    2013-01-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers’ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all. PMID:24135190

  3. Rising food costs & global food security: Key issues & relevance for India

    Directory of Open Access Journals (Sweden)

    Daniel J Gustafson

    2013-01-01

    Full Text Available Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers′ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country′s reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  4. Rising food costs & global food security: key issues & relevance for India.

    Science.gov (United States)

    Gustafson, Daniel J

    2013-09-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers' incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  5. ASSESSMENT OF THE BUSINESS ENVIRONMENT FOR DEVELOPMENT OF GLOBAL MARKETING STRATEGY

    Directory of Open Access Journals (Sweden)

    V. Savelyev

    2014-03-01

    Full Text Available The article concerns with essence of assessment of the business environment and specific directions of analysis during the working out of global marketing strategy. The classification of the global marketing environment researches and tasks sequence in the context of the decisions made on each stage of global marketing strategy is proposed.

  6. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  7. Quantifying the impact of weather extremes on global food security: A spatial bio-economic approach

    Directory of Open Access Journals (Sweden)

    Sika Gbegbelegbe

    2014-08-01

    Full Text Available This study uses a spatial bio-economic modelling framework to estimate the impact of the 2012 weather extreme in the USA on food security in the developing world. The study also quantifies the potential effects of a similar weather extreme occurring in 2050 under climate change. The study results indicate that weather extremes that affect maize productivity in key grain baskets can negatively affect food security in vulnerable countries. The 2012 weather extreme which occurred in the USA reduced US and global maize production by 29% compared to trend; maize consumption in the country decreased by 5% only and this resulted in less surplus maize for exports from the largest maize exporter in the world. Global maize production decreased by 6% compared to trend. The decrease in global maize production coupled with a reduction in the volume of global maize exports worsened food insecurity in eastern Africa, the Caribbean and Central America and India. The effects of the weather extreme on global food security would be worse, if the latter were to occur under climate change in 2050, assuming no climate change adaptation worldwide over the years. In addition, the hardest-hit regions would remain the same, whether the weather extreme occurs in 2012 instead of 2050: Sub-Saharan Africa (SSA, South Asia and the Latin America and Caribbean (LAC region. However, sustained growth in per capita income across world economies between 2000 and 2050 would allow few countries in SSA and the LAC region to virtually eliminate hunger within their borders. In these countries, per capita income would be high enough by 2050 to completely offset the negative effect of the weather extreme. The study results are also consistent with USDA׳s estimates on US and global maize production and consumption in 2012 after the weather extreme. Some discrepancy is found on the volume of global maize trade; this implies that the bio-economic model likely overestimates the effect of the

  8. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  9. IoT Privacy and Security Challenges for Smart Home Environments

    Directory of Open Access Journals (Sweden)

    Huichen Lin

    2016-07-01

    Full Text Available Often the Internet of Things (IoT is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

  10. An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment

    Directory of Open Access Journals (Sweden)

    Mansik Kim

    2017-08-01

    Full Text Available As the Internet of Things (IoT has developed, the emerging sensor network (ESN that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future.

  11. Psychological factors of the readiness of teachers to ensure social security in the educational environment.

    Directory of Open Access Journals (Sweden)

    Shmeleva E.A.

    2015-03-01

    Full Text Available The negative sociocultural transformations that are taking place in modern society and the resulting psychological transformation of personality and mode of life strongly require searching for ways of providing social safety to the next generation, with teachers being the implementers of this process. Teachers’ professionalism is determined by their willingness to solve personal and socially relevant problems, including the willingness to provide social security for other people, to thwart social risks, and to build constructive interpersonal relationships. The aim of our research was to reveal and to analyze the psychological factors affecting the readiness of teachers to ensure social security in educational environments. The environmental factors of social risk have been theoretically characterized. It has been shown that the essential factor in ensuring students’ social security is providing a safe social environment in educational institutions; such an environment provides the learners and the teachers with sociopsychological security and psychosocial well-being. The empirical part of our study was devoted to identifying negative social phenomena in the schools in the Ivanovo region (with the help of a questionnaire administered to 700 students and to identifying the personally and professionally important qualities of the teachers and the subjective psychological factors of their readiness to ensure social security in the educational environment (through interviewing 300 teachers; the administration of the questionnaires and the interviewing were followed by an assessment of their significance (with the help of a questionnaire administered to 140 teachers. Using factor analysis we identified the relevant indicators and grouped them into six factors of the readiness of teachers to ensure a safe educational environment. Relevant personal and professional qualities of teachers were revealed; these are the subjective factors of the

  12. The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2015-01-01

    This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.

  13. 'Vulnerability is universal': considering the place of 'security' and 'vulnerability' within contemporary global health discourse.

    Science.gov (United States)

    Brown, Tim

    2011-02-01

    The question of global health has, at least since 9/11, (re)emerged as one of the world's key geopolitical issues and, as many scholars have noted, this increased attention to the state of world health is especially focused on questions of national security and vulnerability. Despite its prominence in political, health policy and scholarly circles, health geographers have tended to overlook this particular aspect of global health discourse. This paper seeks to redress this lacuna. It does so for three reasons. The first lies in the idea that this discourse is inherently geographical; after all, it is in essence concerned with the flows of human and non-human agents within and, more importantly here, across, national borders. It is also of interest because a focus on vulnerability allows for an analysis that goes beyond the current fixation with emerging and re-emerging infectious diseases. Although it is certainly true that the concern with such diseases dominates, and the recent focus upon H1N1 swine flu is testament to that, there is also a suggestion that the processes associated with the enhanced threat posed by these diseases are similar to those that have caused non-communicable diseases to become a global health problem too. A third reason for focussing on this aspect of the global health discourse is that the subsequent search for 'security' is highly problematic; especially if we consider the question of "who is to be protected, and from what". The aim of the paper is, then, to offer a critical review of the international discourse on global health and to highlight its relevance to scholars that self-identify as health and medical geographers. Copyright © 2010 Elsevier Ltd. All rights reserved.

  14. Securing the virtual environment how to defend the enterprise against attack

    CERN Document Server

    Ottenheimer, Davi

    2012-01-01

    A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models an

  15. Breeding blueberries for a changing global environment: a review

    Science.gov (United States)

    Lobos, Gustavo A.; Hancock, James F.

    2015-01-01

    Today, blueberries are recognized worldwide as one of the foremost health foods, becoming one of the crops with the highest productive and commercial projections. Over the last 100 years, the geographical area where highbush blueberries are grown has extended dramatically into hotter and drier environments. The expansion of highbush blueberry growing into warmer regions will be challenged in the future by increases in average global temperature and extreme fluctuations in temperature and rainfall patterns. Considerable genetic variability exists within the blueberry gene pool that breeders can use to meet these challenges, but traditional selection techniques can be slow and inefficient and the precise adaptations of genotypes often remain hidden. Marker assisted breeding (MAB) and phenomics could aid greatly in identifying those individuals carrying adventitious traits, increasing selection efficiency and shortening the rate of cultivar release. While phenomics have begun to be used in the breeding of grain crops in the last 10 years, their use in fruit breeding programs it is almost non-existent. PMID:26483803

  16. Breeding blueberries for a changing global environment: a review

    Directory of Open Access Journals (Sweden)

    Gustavo A. Lobos

    2015-09-01

    Full Text Available Today, blueberries are recognized worldwide as one of the foremost health foods, becoming one of the crops with the highest productive and commercial projections. Over the last hundred years, the geographical area where highbush blueberries are grown has extended dramatically into hotter and drier environments. The expansion of highbush blueberry growing into warmer regions will be challenged in the future by increases in average global temperature and extreme fluctuations in temperature and rainfall patterns. Considerable genetic variability exists within the blueberry gene pool that breeders can use to meet these challenges, but traditional selection techniques can be slow and inefficient and the precise adaptations of genotypes often remain hidden. Marker assisted breeding (MAB and phenomics could aid greatly in identifying those individuals carrying adventitious traits, increasing selection efficiency and shortening the rate of cultivar release. While phenomics have begun to be used in the breeding of grain crops in the last 10 years, their use in fruit breeding programs it is almost non-existent.

  17. CORPORATE COMMUNICATION BIASES IN THE BUSINESS ENVIRONMENT UNDER GLOBALIZATION TRENDS

    Directory of Open Access Journals (Sweden)

    Ramona-Elena, Chiţu

    2012-01-01

    Full Text Available The development of the private sector, employers’ requirements of specific communication skills, the economic field division into numberless branches of activity – finance and banks, management, human resources, accounting, international relations, tourism – the presence of a certain literature in the field by means of translations, all such aspects represent grounded reasons for the existence of a global economic vocabulary in the Romanian language. Finding its origins in the structuralism philosophic principles and associated with the structuralism linguistic trends, economic language’s globalisation becomes obvious nowadays through the occurrence of a large number of linguistic borrowings. Classified into either needless or necessary borrowed lexical units, lexical units borrowed and completely or at all assimilated in the target language, such borrowings lay the foundation of what specialists in the field call corporate language. Considering that the total or partial lack of knowledge on such language can become a real barrier in achieving communication, this study aims at analysing the level to which such words are known by the employees in the business environments involved in economic international partnerships and in multinational organisations.

  18. Global Health Engagement and The Department of Defense as a Vehicle for Security and Sustainable Global Health.

    Science.gov (United States)

    Moten, Asad; Schafer, Daniel; Burkett, Edwin K

    2018-01-01

    The Unites States Department of Defense (DoD) is viewed by many in the general public as a monolithic government entity whose primary purpose is to coordinate this country's ability to make war and maintain a military presence around the world. However, the DoD is in fact a multidimensional organization whose global impact is as expansive as it is varying and is responsible for far-reaching global health interventions. The United States has worked toward providing long-term care among host nation populations by providing training in several areas related to medicine, with positive results. These efforts can be built upon with substantial positive effects. Building health infrastructure and capacity around the world is essential. The DoD is the most generously funded agency in the world, and the resources at its disposal provide the opportunity to make great gains in the long term in terms of both health and security worldwide. With efficient and careful use of DoD resources, and partnerships with key non-governmental organizations with specialized knowledge and great passion, partnerships can be forged with communities around the world to ensure that public health is achieved in even the most underserved communities. A move toward creating sustainable health systems with long-term goals and measurable outcomes is an essential complement to the already successful disaster and emergency relief that the United States military already provides. By ensuring that communities around the world are both provided with access to the sustainable health care they need and that emergency situations can be responded to in an efficient way, the United States can serve its duty as a leader in sharing expertise and resources for the betterment and security of all humankind. Published by Oxford University Press on behalf of the Association of Military Surgeons of the United States 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  19. An approach for investigation of secure access processes at a combined e-learning environment

    Science.gov (United States)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  20. One of the Approaches to Creation of Hybrid Cloud Secure Environment

    Directory of Open Access Journals (Sweden)

    Andrey Konstantinovich Kachko

    2014-02-01

    Full Text Available In response to the ever growing needs in the storage and processing of data the main position are occupied by informational-telecommunication systems, operating on the basis of cloud computing. In this case, the key point in the use of cloud computing is the problem of information security. This article is primarily intended to cover the main information safety issues that occur in cloud environments and ways of their solutions in the construction of an integrated information security management system on the cloud architecture.

  1. Rethinking ethical issues in global business environment | Mirwoba ...

    African Journals Online (AJOL)

    In the wake of globalization and liberalization policy, business ethics ... a push for diversity that has resulted into corporate business cultures that are ... The impediment of global business ethics is the phenomenon that, unlike established laws ...

  2. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  3. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  4. Collective Security in the Context of Globalization. The Case of Romania

    Directory of Open Access Journals (Sweden)

    Vlad Dumitrache

    2016-06-01

    Full Text Available European countries have taken part in the Globalization process ever since the end of the Second World War. Being active members of international institutions like the IMF, World Bank Group, NATO or the WTO, the European countries have even developed a collective entity of their own, that of the European Union. In later years, Eastern European countries like Romania have also become a part of this globalised system. It is the aim of this paper to present the effects that this integration has brought in terms of economic development and security challenges for EU member states, by taking into consideration the example of Romania.

  5. Legal and regulatory capacity to support the global health security agenda.

    Science.gov (United States)

    Morhard, Ryan; Katz, Rebecca

    2014-01-01

    On February 13, 2014, 27 nations, along with 3 international organizations, launched the Global Health Security Agenda (GHSA). The intent of GHSA is to accelerate progress in enabling countries around the world to prevent, detect, and respond to public health emergencies-capacities to be achieved through 9 core objectives. Building national, regional, and international capacity includes creating strong legal and regulatory regimes to support national and international capacities to prevent, detect, and respond to public health emergencies. Accordingly, establishing and reinforcing international and national-level legal preparedness is central to advancing elements of each of the 9 objectives of the GHSA.

  6. Global partnering related to nuclear materials safeguards and security - A pragmatic approach to international safeguards work

    International Nuclear Information System (INIS)

    Stanford, Dennis

    2007-01-01

    This paper documents issues Nuclear Fuel Services, Inc. has addressed in the performance of international work to safeguards and security work. It begins with a description of the package we put together for a sample proposal for the Global Threat Reduction Initiative, for which we were ranked number one for technical approach and cost, and concludes with a discussion of approaches that we have taken to performing this work, including issues related to performing the work as part of a team. The primary focus is on communication, workforce, equipment, and coordination issues. Finally, the paper documents the rules that we use to assure the work is performed safely and successfully. (author)

  7. GEOGLAM Crop Assessment Tool: Adapting from global agricultural monitoring to food security monitoring

    Science.gov (United States)

    Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.

    2014-12-01

    The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.

  8. World Energy Balance Outlook and OPEC Production Capacity: Implications for Global Oil Security

    Directory of Open Access Journals (Sweden)

    Azadeh M. Rouhani

    2012-07-01

    Full Text Available The imbalance between energy resource availability, demand, and production capacity, coupled with inherent economic and environmental uncertainties make strategic energy resources planning, management, and decision-making a challenging process. In this paper, a descriptive approach has been taken to synthesize the world’s energy portfolio and the global energy balance outlook in order to provide insights into the role of Organization of Petroleum Exporting Countries (OPEC in maintaining “stability” and “balance” of the world’s energy market. This synthesis illustrates that in the absence of stringent policies, i.e., if historical trends of the global energy production and consumption hold into the future, it is unlikely that non-conventional liquid fuels and renewable energy sources will play a dominant role in meeting global energy demand by 2030. This should be a source of major global concern as the world may be unprepared for an ultimate shift to other energy sources when the imminent peak oil production is reached. OPEC’s potential to impact the supply and price of oil could enable this organization to act as a facilitator or a barrier for energy transition policies, and to play a key role in the global energy security through cooperative or non-cooperative strategies. It is argued that, as the global energy portfolio becomes more balanced in the long run, OPEC may change its typical high oil price strategies to drive the market prices to lower equilibria, making alternative energy sources less competitive. Alternatively, OPEC can contribute to a cooperative portfolio management approach to help mitigate the gradually emerging energy crisis and global warming, facilitating a less turbulent energy transition path while there is time.

  9. The global obesity pandemic: shaped by global drivers and local environments.

    Science.gov (United States)

    Swinburn, Boyd A; Sacks, Gary; Hall, Kevin D; McPherson, Klim; Finegood, Diane T; Moodie, Marjory L; Gortmaker, Steven L

    2011-08-27

    The simultaneous increases in obesity in almost all countries seem to be driven mainly by changes in the global food system, which is producing more processed, affordable, and effectively marketed food than ever before. This passive overconsumption of energy leading to obesity is a predictable outcome of market economies predicated on consumption-based growth. The global food system drivers interact with local environmental factors to create a wide variation in obesity prevalence between populations. Within populations, the interactions between environmental and individual factors, including genetic makeup, explain variability in body size between individuals. However, even with this individual variation, the epidemic has predictable patterns in subpopulations. In low-income countries, obesity mostly affects middle-aged adults (especially women) from wealthy, urban environments; whereas in high-income countries it affects both sexes and all ages, but is disproportionately greater in disadvantaged groups. Unlike other major causes of preventable death and disability, such as tobacco use, injuries, and infectious diseases, there are no exemplar populations in which the obesity epidemic has been reversed by public health measures. This absence increases the urgency for evidence-creating policy action, with a priority on reduction of the supply-side drivers. Copyright © 2011 Elsevier Ltd. All rights reserved.

  10. Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.

    Science.gov (United States)

    Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H

    2018-04-29

    The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.

  11. Analysis of Security Mechanisms Based on Clusters IoT Environments

    Directory of Open Access Journals (Sweden)

    Paulo Gaona-García

    2017-03-01

    Full Text Available Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. This paper presents an analysis from a systematic review point of view of articles on Internet of Things (IoT, security aspects specifically at privacy level and control access in this type of environment. Finally, it presents an analysis of security issues that must be addressed, from different clusters and identified areas within the fields of application of this technology.

  12. PRINCIPLE OF THE ELECTRONIC EDUCATIONAL ENVIRONMENT SECURITY IN THE PROFESSIONAL TRAINING OF UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Valery G. Tylets

    2017-12-01

    Full Text Available The article considers the problem of professional training of students in e-learning environment in accordance with the principle of security. The authors offer the essay technology of multiple difficulty levels. In the article the description of each level of technology proves its conformity to the positions of principle of security. The main methods of measurement performance were made by expert assessment and subjective scaling. The analysis of results of approbation of essay technology of multiple difficulty levels in the experimental sample showed an increase of objective and subjective indicators. Positive methodological and personal effects of the introduction of technology into the process of university education were identified, corresponding to the positions of principle of security. Methodical recommendations of application of technology were formulated.

  13. Security Analysis of Measurement-Device-Independent Quantum Key Distribution in Collective-Rotation Noisy Environment

    Science.gov (United States)

    Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian

    2018-01-01

    Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.

  14. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  15. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    Science.gov (United States)

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  18. Adaptive Global Innovative Learning Environment for Glioblastoma: GBM AGILE.

    Science.gov (United States)

    Alexander, Brian M; Ba, Sujuan; Berger, Mitchel S; Berry, Donald A; Cavenee, Webster K; Chang, Susan M; Cloughesy, Timothy F; Jiang, Tao; Khasraw, Mustafa; Li, Wenbin; Mittman, Robert; Poste, George H; Wen, Patrick Y; Yung, W K Alfred; Barker, Anna D

    2018-02-15

    Glioblastoma (GBM) is a deadly disease with few effective therapies. Although much has been learned about the molecular characteristics of the disease, this knowledge has not been translated into clinical improvements for patients. At the same time, many new therapies are being developed. Many of these therapies have potential biomarkers to identify responders. The result is an enormous amount of testable clinical questions that must be answered efficiently. The GBM Adaptive Global Innovative Learning Environment (GBM AGILE) is a novel, multi-arm, platform trial designed to address these challenges. It is the result of the collective work of over 130 oncologists, statisticians, pathologists, neurosurgeons, imagers, and translational and basic scientists from around the world. GBM AGILE is composed of two stages. The first stage is a Bayesian adaptively randomized screening stage to identify effective therapies based on impact on overall survival compared with a common control. This stage also finds the population in which the therapy shows the most promise based on clinical indication and biomarker status. Highly effective therapies transition in an inferentially seamless manner in the identified population to a second confirmatory stage. The second stage uses fixed randomization to confirm the findings from the first stage to support registration. Therapeutic arms with biomarkers may be added to the trial over time, while others complete testing. The design of GBM AGILE enables rapid clinical testing of new therapies and biomarkers to speed highly effective therapies to clinical practice. Clin Cancer Res; 24(4); 737-43. ©2017 AACR . ©2017 American Association for Cancer Research.

  19. Global maize trade and food security: implications from a social network model.

    Science.gov (United States)

    Wu, Felicia; Guclu, Hasan

    2013-12-01

    In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability was decreased due to factors such as diversion to nonfood uses, climatic factors, or plant diseases. Using data on imports and exports from the U.N. Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, whereas Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents U.S. maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which U.S. maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. © 2013 Society for Risk Analysis.

  20. IT-security challenges in IoT environments and autonomous systems

    Science.gov (United States)

    Heun, Ulrich

    2017-05-01

    Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.

  1. NATO Advanced Study Institute on Optical Waveguide Sensing and Imaging in Medicine, Environment, Security and Defence

    CERN Document Server

    Bock, Wojtek J; Tanev, Stoyan

    2008-01-01

    The book explores various aspects of existing and emerging fiber and waveguide optics sensing and imaging technologies including recent advances in nanobiophotonics. The focus is both on fundamental and applied research as well as on applications in civil engineering, biomedical sciences, environment, security and defence. The main goal of the multi-disciplinarry team of Editors was to provide an useful reference of state-of-the-art overviews covering a variety of complementary topics on the interface of engineering and biomedical sciences.

  2. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  3. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  4. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  5. EDUCATION IN GLOBAL INFORMATION-COMMUNICATION AND ANTHROPOGENIC ENVIRONMENT: NEW OPPORTUNITIES AND LIMITS

    Directory of Open Access Journals (Sweden)

    Sergey F. Sergeev

    2013-01-01

    Full Text Available The article answers the question of how to use global anthropogenic environments in order to create effective educational environment. We demonstrate both technological and didactic abilities and limits of modern environment-based technologies, and provide a new approach to the educational environment creation. 

  6. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  7. Global Environmental Micro Sensors Test Operations in the Natural Environment

    Science.gov (United States)

    Adams, Mark L.; Buza, Matthew; Manobianco, John; Merceret, Francis J.

    2007-01-01

    ENSCO, Inc. is developing an innovative atmospheric observing system known as Global Environmental Micro Sensors (GEMS). The GEMS concept features an integrated system of miniaturized in situ, airborne probes measuring temperature, relative humidity, pressure, and vector wind velocity. In order for the probes to remain airborne for long periods of time, their design is based on a helium-filled super-pressure balloon. The GEMS probes are neutrally buoyant and carried passively by the wind at predetermined levels. Each probe contains onboard satellite communication, power generation, processing, and geolocation capabilities. ENSCO has partnered with the National Aeronautics and Space Administration's Kennedy Space Center (KSC) for a project called GEMS Test Operations in the Natural Environment (GEMSTONE) that will culminate with limited prototype flights of the system in spring 2007. By leveraging current advances in micro and nanotechnology, the probe mass, size, cost, and complexity can be reduced substantially so that large numbers of probes could be deployed routinely to support ground, launch, and landing operations at KSC and other locations. A full-scale system will improve the data density for the local initialization of high-resolution numerical weather prediction systems by at least an order of magnitude and provide a significantly expanded in situ data base to evaluate launch commit criteria and flight rules. When applied to launch or landing sites, this capability will reduce both weather hazards and weather-related scrubs, thus enhancing both safety and cost-avoidance for vehicles processed by the Shuttle, Launch Services Program, and Constellation Directorates. The GEMSTONE project will conclude with a field experiment in which 10 to 15 probes are released over KSC in east central Florida. The probes will be neutrally buoyant at different altitudes from 500 to 3000 meters and will report their position, speed, heading, temperature, humidity, and

  8. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Qiang Wei

    2018-01-01

    Full Text Available Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in “Paid Data Sharing” model, some valuable data should be encrypted before outsourcing for protecting owner’s economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (user will download which data files in advance and even does not know the attributes of user, he/she has to either remain online all the time or import a trusted third party (TTP to distribute the file decryption key to data user. Obviously, making the owner always remain online is too inflexible, and wholly depending on the security of TTP is a potential risk. In this paper, we propose a flexible, secure, and reliable data sharing scheme based on collaboration in multicloud environment. For securely and instantly providing data sharing service even if the owner is offline and without TTP, we distribute all encrypted split data/key blocks together to multiple cloud service providers (CSPs, respectively. An elaborate cryptographic protocol we designed helps the owner verify the correctness of data exchange bills, which is directly related to the owner’s economic benefits. Besides, in order to support reliable data service, the erasure-correcting code technic is exploited for tolerating multiple failures among CSPs, and we offer a secure keyword search mechanism that makes the system more close to reality. Extensive security analyses and experiments on real-world data show that our scheme is secure and efficient.

  9. Exploring the impact of the 2008 global food crisis on food security among vulnerable households in rural South Africa.

    Science.gov (United States)

    Nawrotzki, Raphael J; Robson, Kristin; Gutilla, Margaret J; Hunter, Lori M; Twine, Wayne; Norlund, Petra

    2014-04-01

    Recurring food crises endanger the livelihoods of millions of households in developing countries around the globe. Owing to the importance of this issue, we explore recent changes in food security between the years 2004 and 2010 in a rural district in Northeastern South Africa. Our study window spans the time of the 2008 global food crises and allows the investigation of its impacts on rural South African populations. Grounded in the sustainable livelihood framework, we examine differences in food security trajectories among vulnerable sub populations. A unique panel data set of 8,147 households, provided by the Agincourt Health and Demographic Surveillance System (Agincourt HDSS), allows us to employ a longitudinal multilevel modeling approach to estimate adjusted growth curves for the differential change in food security across time. We observe an overall improvement in food security that leveled off after 2008, most likely resulting from the global food crisis. In addition, we discover significant differences in food security trajectories for various sub populations. For example, female-headed households and those living in areas with better access to natural resources differentially improved their food security situation, compared to male-headed households and those households with lower levels of natural resource access. However, former Mozambican refugees witnessed a decline in food security. Therefore, poverty alleviation programs for the Agincourt region should work to improve the food security of vulnerable households, such as former Mozambican refugees.

  10. Monitoring Global Food Security with New Remote Sensing Products and Tools

    Science.gov (United States)

    Budde, M. E.; Rowland, J.; Senay, G. B.; Funk, C. C.; Husak, G. J.; Magadzire, T.; Verdin, J. P.

    2012-12-01

    Global agriculture monitoring is a crucial aspect of monitoring food security in the developing world. The Famine Early Warning Systems Network (FEWS NET) has a long history of using remote sensing and crop modeling to address food security threats in the form of drought, floods, pests, and climate change. In recent years, it has become apparent that FEWS NET requires the ability to apply monitoring and modeling frameworks at a global scale to assess potential impacts of foreign production and markets on food security at regional, national, and local levels. Scientists at the U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center and the University of California Santa Barbara (UCSB) Climate Hazards Group have provided new and improved data products as well as visualization and analysis tools in support of the increased mandate for remote monitoring. We present our monitoring products for measuring actual evapotranspiration (ETa), normalized difference vegetation index (NDVI) in a near-real-time mode, and satellite-based rainfall estimates and derivatives. USGS FEWS NET has implemented a Simplified Surface Energy Balance (SSEB) model to produce operational ETa anomalies for Africa and Central Asia. During the growing season, ETa anomalies express surplus or deficit crop water use, which is directly related to crop condition and biomass. We present current operational products and provide supporting validation of the SSEB model. The expedited Moderate Resolution Imaging Spectroradiometer (eMODIS) production system provides FEWS NET with an improved NDVI dataset for crop and rangeland monitoring. eMODIS NDVI provides a reliable data stream with a relatively high spatial resolution (250-m) and short latency period (less than 12 hours) which allows for better operational vegetation monitoring. We provide an overview of these data and cite specific applications for crop monitoring. FEWS NET uses satellite rainfall estimates as inputs for

  11. Growing water scarcity in agriculture: future challenge to global water security.

    Science.gov (United States)

    Falkenmark, Malin

    2013-11-13

    As water is an essential component of the planetary life support system, water deficiency constitutes an insecurity that has to be overcome in the process of socio-economic development. The paper analyses the origin and appearance of blue as well as green water scarcity on different scales and with particular focus on risks to food production and water supply for municipalities and industry. It analyses water scarcity originating from both climatic phenomena and water partitioning disturbances on different scales: crop field, country level and the global circulation system. The implications by 2050 of water scarcity in terms of potential country-level water deficits for food self-reliance are analysed, and the compensating dependence on trade in virtual water for almost half the world population is noted. Planetary-scale conditions for sustainability of the global water circulation system are discussed in terms of a recently proposed Planetary Freshwater Boundary, and the consumptive water use reserve left to be shared between water requirements for global food production, fuelwood production and carbon sequestration is discussed. Finally, the importance of a paradigm shift in the further conceptual development of water security is stressed, so that adequate attention is paid to water's fundamental role in both natural and socio-economic systems.

  12. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  13. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  14. The causal texture of trade union environments | Iyayi | Global ...

    African Journals Online (AJOL)

    This paper is an attempt to fill an important gap in the existing literature on trade unions by providing a more adequate theoretical formulation of trade union environments. The discussion suggests that unlike the environment of business and related organisations whose causal texture is understood in terms of uncertainty, ...

  15. Globalization

    OpenAIRE

    Andru?cã Maria Carmen

    2013-01-01

    The field of globalization has highlighted an interdependence implied by a more harmonious understanding determined by the daily interaction between nations through the inducement of peace and the management of streamlining and the effectiveness of the global economy. For the functioning of the globalization, the developing countries that can be helped by the developed ones must be involved. The international community can contribute to the institution of the development environment of the gl...

  16. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  17. Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments

    Science.gov (United States)

    Peris-Lopez, Pedro; Hernandez-Castro, Julio C.; Tapiador, Juan M. E.; Millán, Enrique San; van der Lubbe, Jan C. A.

    In 2004, Settharam and Rhee tackled the design of a lightweight Pseudo-Random Number Generator (PRNG) suitable for low-power environments (e.g. sensor networks, low-cost RFID tags). First, they explicitly fixed a set of requirements for this primitive. Then, they proposed a PRNG conforming to these requirements and using a free-running timer [9]. We analyze this primitive discovering important security faults. The proposed algorithm fails to pass even relatively non-stringent batteries of randomness such as ENT (i.e. a pseudorandom number sequence test program). We prove that their recommended PRNG has a very short period due to the flawed design of its core. The internal state can be easily revealed, compromising its backward and forward security. Additionally, the rekeying algorithm is defectively designed mainly related to the unpractical value proposed for this purpose.

  18. Global food and fibre security threatened by current inefficiencies in fungal identification

    Science.gov (United States)

    2016-01-01

    Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity, life cycle stages and population structures. The majority of current fungal species descriptions lack even the most basic genetic data that could address at least some of these issues. Such information is essential for accurate fungal identifications, to link critical metadata and to understand the real and potential impact of fungal pathogens on production and natural ecosystems. Because international trade in plant products and introduction of pathogens to new areas is likely to continue, the manner in which fungal pathogens are identified should urgently be reconsidered. The technologies that would provide appropriate information for biosecurity and quarantine already exist, yet the scientific community and the regulatory authorities are slow to embrace them. International agreements are urgently needed to enforce new guidelines for describing plant pathogenic fungi (including key DNA information), to ensure availability of relevant data and to modernize the phytosanitary systems that must deal with the risks relating to trade-associated plant pathogens. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080994

  19. Analyzing the greenhouse gas impact potential of smallholder development actions across a global food security program

    Science.gov (United States)

    Grewer, Uwe; Nash, Julie; Gurwick, Noel; Bockel, Louis; Galford, Gillian; Richards, Meryl; Costa Junior, Ciniro; White, Julianna; Pirolli, Gillian; Wollenberg, Eva

    2018-04-01

    This article analyses the greenhouse gas (GHG) impact potential of improved management practices and technologies for smallholder agriculture promoted under a global food security development program. Under ‘business-as-usual’ development, global studies on the future of agriculture to 2050 project considerable increases in total food production and cultivated area. Conventional cropland intensification and conversion of natural vegetation typically result in increased GHG emissions and loss of carbon stocks. There is a strong need to understand the potential greenhouse gas impacts of agricultural development programs intended to achieve large-scale change, and to identify pathways of smallholder agricultural development that can achieve food security and agricultural production growth without drastic increases in GHG emissions. In an analysis of 134 crop and livestock production systems in 15 countries with reported impacts on 4.8 million ha, improved management practices and technologies by smallholder farmers significantly reduce GHG emission intensity of agricultural production, increase yields and reduce post-harvest losses, while either decreasing or only moderately increasing net GHG emissions per area. Investments in both production and post-harvest stages meaningfully reduced GHG emission intensity, contributing to low emission development. We present average impacts on net GHG emissions per hectare and GHG emission intensity, while not providing detailed statistics of GHG impacts at scale that are associated to additional uncertainties. While reported improvements in smallholder systems effectively reduce future GHG emissions compared to business-as-usual development, these contributions are insufficient to significantly reduce net GHG emission in agriculture beyond current levels, particularly if future agricultural production grows at projected rates.

  20. Global security: The need for a new beginning, 12 October 2007, New Delhi, Hindustan Times Leadership Summit

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    The search for security remains the overriding concern for many peoples and nations. But the definition of what constitutes security, and the strategies for attaining it, vary greatly. For billions of people, the quest is to 'secure' basic needs: food, water, shelter and health care - in other words, freedom from want. For others, it is to 'secure' other fundamental human rights: freedom of expression, freedom from oppression, freedom from fear. Even among States, security has different definitions. For some, it is the achievement of economic or military parity or superiority, for others the projection of power and influence, and for still others the resolution of grievances and disputes. If we look at the quest to secure basic needs, we are struck by the persistent inequity in the global distribution of wealth. If we look at the quest for other fundamental human rights, the picture is also grim in many regions, with problems ranging from religious intolerance and the lack of political freedom to systematic oppression and torture. Perhaps the most severe critique of our global progress in this area is reflected in our uneven approach to the sanctity of human life. If we look at the security of nation-States, our record is also poor, particularly as reflected in regional conflicts that have been allowed to fester for decades. The effort to curtail nuclear threats is still a work in progress. Consider the events of just the past few years. The war in Iraq over suspicions that nuclear and other weapons programmes had been revived. North Korea's withdrawal from the NPT and subsequent test of a nuclear weapon. Libya's relinquishment of a fledgling nuclear weapons programme. The discovery of A. Q. Khan's illicit nuclear procurement and distribution network. The still ongoing investigation of Iran's clandestine nuclear programme. And not least, a surge in the sophistication of extremist networks - underscoring the potential for nuclear and radiological terrorism. Add to

  1. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    Executive Summary The authors argue that challenges to capturing value from know-how and reputation through the use of different IP tools will be an increasingly important matter of strategy for global enterprises. This has important implications for management practice. Global enterprises...... will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP......), develop their know-how, and build and maintain their reputation globally during the last decades. We focus on three tools: patents, trademarks, and industrial designs. We find that, although most IP applications come from a few countries (the United States, European Union, Japan, China, and South Korea...

  2. A collaborative virtual environment for training of security agents in nuclear emergencies

    International Nuclear Information System (INIS)

    Fernandes, Sara I.; Passos, Cláudio A.; Silva, Marcio H.; Carvalho, Paulo Victor R.; Legey, Ana Paula; Mol, Antonio Carlos; Machado, Daniel M.; Cotelli, André; Rocha, Tiago L.

    2017-01-01

    In face the recently observed security menaces related to terrorist actions and natural disasters, there is a need for a major qualification and training of the agents responsible for avoid any problems regarding to abnormal conditions. In the conventional training procedures, however, field simulations are associated to logistical and operational constraints regarded to the execution of the tests which can expose the user to risk. On the other hand, the use of virtual simulations provides an alternative to such limitations besides of promote the qualifying of professionals with a great reliability. For this reason, this paper proposes the development of a collaborative virtual environment that will be used to prepare the security agents on identifying individuals suspected of carrying radioactive materials. The development of the virtual environment consisted on modeling using Autodesk 3ds Max, where the scene itself and the scene objects were modeled besides the terrain creation and basic features programming using the Game Engine Unity 3D. In the Engine Game were included radiation detectors and avatars. The security agents were able to communicate to each other by means of auxiliary external tools like a headset software that makes possible the communication, coordination and cooperation required for an effective collaboration. Experimental tests of the virtual simulations were performed with the participation of CNEN radiological protection agents and collaborators. The tests have shown that the proposed method can contribute to improve the training results of the basic collaborative skills required for a CNEN agent in an emergency situation without the need to expose him to any kind of risk. In face of that, we hope that it can contribute to minimize the demand for qualified security professionals. (author)

  3. A collaborative virtual environment for training of security agents in nuclear emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, Sara I.; Passos, Cláudio A.; Silva, Marcio H.; Carvalho, Paulo Victor R.; Legey, Ana Paula; Mol, Antonio Carlos; Machado, Daniel M.; Cotelli, André; Rocha, Tiago L., E-mail: mol@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Departamento de Realidade Virtual

    2017-07-01

    In face the recently observed security menaces related to terrorist actions and natural disasters, there is a need for a major qualification and training of the agents responsible for avoid any problems regarding to abnormal conditions. In the conventional training procedures, however, field simulations are associated to logistical and operational constraints regarded to the execution of the tests which can expose the user to risk. On the other hand, the use of virtual simulations provides an alternative to such limitations besides of promote the qualifying of professionals with a great reliability. For this reason, this paper proposes the development of a collaborative virtual environment that will be used to prepare the security agents on identifying individuals suspected of carrying radioactive materials. The development of the virtual environment consisted on modeling using Autodesk 3ds Max, where the scene itself and the scene objects were modeled besides the terrain creation and basic features programming using the Game Engine Unity 3D. In the Engine Game were included radiation detectors and avatars. The security agents were able to communicate to each other by means of auxiliary external tools like a headset software that makes possible the communication, coordination and cooperation required for an effective collaboration. Experimental tests of the virtual simulations were performed with the participation of CNEN radiological protection agents and collaborators. The tests have shown that the proposed method can contribute to improve the training results of the basic collaborative skills required for a CNEN agent in an emergency situation without the need to expose him to any kind of risk. In face of that, we hope that it can contribute to minimize the demand for qualified security professionals. (author)

  4. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Alcácer, Juan; Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... in patents, trademarks, and industrial designs used by firms to protect their IP globally. We then show that IP protection remains fragmented; the quality of IP applications might be questionable; and developing a comprehensive IP footprint worldwide is very costly. Growing numbers of applications...

  5. Globalization in a Religiously Pluralistic Environment: The Nigerian ...

    African Journals Online (AJOL)

    FIRST LADY

    Ways of assimilating the positive effects of globalization were considered while the .... appreciation of foreign goods including food items to the scorn of what they have. .... is verily not new among men but the current wind is also verily very fast that .... Like bad doctors, they could be said to treat the symptoms of the disease.

  6. Education and Development in a Globalized Environment: The Case ...

    African Journals Online (AJOL)

    Again, in the present globalized society in which every nation is connected to the other, education is perhaps the only instrument for people to adequately cope with the new trend. In most contemporary nation-states including Nigeria, the level of educational attainment vary across regions. Such discrepancy also exist within ...

  7. Educating Part-Time MBAs for the Global Business Environment

    Science.gov (United States)

    Randolph, W. Alan

    2008-01-01

    To be successful managers in the business world of the 21st century, MBA students must acquire global skills of business acumen, reflection, cultural sensitivity, and multi-cultural teamwork. Developing these skills requires international experience, but educating part-time MBAs creates a special challenge demanding both rigor and efficiency. This…

  8. Meeting global needs via genetics x environment x management

    Science.gov (United States)

    Global food needs are projected to double by 2050 to feed a projected 9 billion people and the challenge presented to agriculture is whether this is feasible. These goals will be faced with an increasing variability in climate and more extremes in temperature and precipitation in all parts of the w...

  9. Globalization in a Religiously Pluralistic Environment: The Nigerian ...

    African Journals Online (AJOL)

    Globalization has become one of the commonplace terms which describe the current world in which we live. The substantive ranks with such other adjectives like cybernetic, technological and democratic. Specifically the term points to the rallying together or homogeneity of world culture in its economic, technological and ...

  10. Global Survey of the Concepts and Understanding of the Interfaces Between Nuclear Safety, Security, and Safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Kovacic, Don N.; Stewart, Scott; Erickson, Alexa R.; Ford, Kerrie D.; Mladineo, Stephen V.

    2015-07-15

    There is increasing global discourse on how the elements of nuclear safety, security, and safeguards can be most effectively implemented in nuclear power programs. While each element is separate and unique, they must nevertheless all be addressed in a country’s laws and implemented via regulations and in facility operations. This topic is of particular interest to countries that are currently developing the infrastructure to support nuclear power programs. These countries want to better understand what is required by these elements and how they can manage the interfaces between them and take advantages of any synergies that may exist. They need practical examples and guidance in this area in order to develop better organizational strategies and technical capacities. This could simplify their legal, regulatory, and management structures and avoid inefficient approaches and costly mistakes that may not be apparent to them at this early stage of development. From the perspective of IAEA International Safeguards, supporting Member States in exploring such interfaces and synergies provides a benefit to them because it acknowledges that domestic safeguards in a country do not exist in a vacuum. Instead, it relies on a strong State System of Accounting and Control that is in turn dependent on a capable and independent regulatory body as well as a competent operator and technical staff. These organizations must account for and control nuclear material, communicate effectively, and manage and transmit complete and correct information to the IAEA in a timely manner. This, while in most cases also being responsible for the safety and security of their facilities. Seeking efficiencies in this process benefits international safeguards and nonproliferation. This paper will present the results of a global survey of current and anticipated approaches and practices by countries and organizations with current or future nuclear power programs on how they are implementing, or

  11. Enhanced Survey and Proposal to secure the data in Cloud Computing Environment

    OpenAIRE

    MR.S.SUBBIAH; DR.S.SELVA MUTHUKUMARAN; DR.T.RAMKUMAR

    2013-01-01

    Cloud computing have the power to eliminate the cost of setting high end computing infrastructure. It is a promising area or design to give very flexible architecture, accessible through the internet. In the cloud computing environment the data will be reside at any of the data centers. Due to that, some data center may leak the data stored on there, beyond the reach and control of the users. For this kind of misbehaving data centers, the service providers should take care of the security and...

  12. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  13. Four Scenarios for Europe. Based on UNEP's third Global Environment Outlook

    International Nuclear Information System (INIS)

    Bakkes, J.; Gaponenko, N.; Mnatsakanian, R.

    2003-01-01

    The third Global Environment Outlook (GEO-3) was published on the eve of the Johannesburg summit (autumn 2002). GEO-3 looked back thirty years and forward thirty years. A set of what-if scenarios was used to explore the ways our society can advance, including implications for environmental and social goals. Characteristically, GEO-3 examines in a relatively deep fashion how its global scenarios can be interpreted in the context of each of the world's regions. This brochure presents the pan-European elaboration of the four GEO-3 scenarios. It focusses on the scenarios proper and their impacts in environmental terms. The scenarios are: The Markets First scenario envisages a world in which market-driven developments converge on the currently prevailing values and expectations in industrialized countries; In a Policy First world, strong actions are undertaken by governments in an attempt to achieve specific social and environmental goals; The Security First scenario assumes a world full of large disparities, where inequality and conflict, brought about by socio-economic and environmental stresses, prevail: and Sustainability First pictures a world in which a new development paradigm emerges in response to the challenge of sustainability supported by new, more equitable values and institutions. The second section describes 'the pan-European tale of the four futures' in a predominantly qualitative manner. Section 3 presents a regionally differentiated examination of the environmental implications of the scenarios. Details on input material, assumptions and methodologies applied, and actual results, can be found in Chapter 4 of GEO-3 'Outlook 2002-32' and in the Technical Background Report on GEO-3 Scenario Work

  14. Uncertainty and learning in a strategic environment. Global climate change

    International Nuclear Information System (INIS)

    Baker, Erin

    2005-01-01

    Global climate change is rife with uncertainties. Yet, we can expect to resolve much of this uncertainty in the next 100 years or so. Therefore, current actions should reflect the value of flexibility. Nevertheless, most models of climate change, particularly game-theoretic models, abstract from uncertainty. A model of the impacts of uncertainty and learning in a non-cooperative game shows that the level of correlation of damages across countries is crucial for determining optimal policy

  15. COMPETITIVENESS OF PERU IN THE NEW GLOBAL ENVIRONMENT

    OpenAIRE

    Gomero Gonzáles, Nicko Alberto

    2014-01-01

    It is important that a country develop strong competitive to gaing solid macroeconomic result and keep constant growing. In Peru has been achieving these past years, and that have been showing in the principals indicator of economic management. The public policies implemented have created favorable scenarios to bring in investments in all productive sectors, At the same time the national companies have been develop capabilities to achieve with successes of the market globalization. The divers...

  16. IRSN 2007 barometer: perception of risks and security by French people. Global results

    International Nuclear Information System (INIS)

    2007-07-01

    This report presents under the form of graphs and comments the results of the annual IRSN opinion poll on matters of risk and security. The IRSN is the French Institute of Radioprotection and Nuclear Safety. Different themes are analysed: the present concerns for French people (in the present society, for the environment, about industrial risks and the image of science), the perception of expertise (who should control an installation, the role and the image of scientific experts, access to expertise documents), the public interest in risk issues (topic of interest, participation to information sessions), the attitude in front of 30 risk situations (presently perceived risks, confidence in public authorities to ensure their protection, truth about information on hazards, hierarchy of 30 situations). The last part is dedicated to the nuclear domain (nuclear risk, skill and credibility of interveners)

  17. Environmental degradation, population displacement and global security: An overview of the issues

    International Nuclear Information System (INIS)

    1992-12-01

    An initial investigation is presented on the interrelationship between environmental degradation and population displacements, in the broader context of how this linkage affects human security. Emphasis is placed on both the causes and effects of population movements, with specific examples drawn from Southeast Asia. Types of migrants, the importance of environmental degradation with respect to other contributing factors, and the effects on origin and destination regions are considered. A key issue is the multi-causality of population displacements and the importance of improving understanding of the issues in order to develop appropriate policies. It is clear from the study that the discussion of environment as a cause or contributing factor to population displacement has, to date, been speculative, and the information provided largely anecdotal. 58 refs., 1 fig., 3 tabs

  18. Global Assessment of Bisphenol A in the Environment

    Directory of Open Access Journals (Sweden)

    Jone Corrales

    2015-07-01

    Full Text Available Because bisphenol A (BPA is a high production volume chemical, we examined over 500 peer-reviewed studies to understand its global distribution in effluent discharges, surface waters, sewage sludge, biosolids, sediments, soils, air, wildlife, and humans. Bisphenol A was largely reported from urban ecosystems in Asia, Europe, and North America; unfortunately, information was lacking from large geographic areas, megacities, and developing countries. When sufficient data were available, probabilistic hazard assessments were performed to understand global environmental quality concerns. Exceedances of Canadian Predicted No Effect Concentrations for aquatic life were >50% for effluents in Asia, Europe, and North America but as high as 80% for surface water reports from Asia. Similarly, maximum concentrations of BPA in sediments from Asia were higher than Europe. Concentrations of BPA in wildlife, mostly for fish, ranged from 0.2 to 13 000 ng/g. We observed 60% and 40% exceedences of median levels by the US Centers for Disease Control and Prevention’s National Health and Nutrition Examination Survey in Europe and Asia, respectively. These findings highlight the utility of coordinating global sensing of environmental contaminants efforts through integration of environmental monitoring and specimen banking to identify regions for implementation of more robust environmental assessment and management programs.

  19. Thinking Globally, Acting Locally: Using the Local Environment to Explore Global Issues.

    Science.gov (United States)

    Simmons, Deborah

    1994-01-01

    Asserts that water pollution is a global problem and presents statistics indicating how much of the world's water is threatened. Presents three elementary school classroom activities on water quality and local water resources. Includes a figure describing the work of the Global Rivers Environmental Education Network. (CFR)

  20. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Directory of Open Access Journals (Sweden)

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  1. Development of Digital Instruction for Environment for Global Warming Alleviation

    Science.gov (United States)

    Praneetham, Chuleewan; Thathong, Kongsak

    2016-01-01

    Technological education and instruction are widely used in the present education trend. Using of digital instruction for environmental subject can encourage students in learning and raise their awareness and attitude on environmental issues. The purposes of this research were: 1) to construct and develop the digital instruction for environment for…

  2. Role of nuclear produced hydrogen for global environment and energy

    International Nuclear Information System (INIS)

    Tashimo, M.; Kurosawa, A.; Ikeda, K.

    2004-01-01

    Sustainability on economical growth, energy supply and environment are major issues for the 21. century. Within this context, one of the promising concepts is the possibility of nuclear-produced hydrogen. In this study, the effect of nuclear-produced hydrogen on the environment is discussed, based on the output of the computer code 'Grape', which simulates the effects of the energy, environment and economy in 21. century. Five cases are assumed in this study. The first case is 'Business as usual by Internal Combustion Engine (ICE)', the second 'CO 2 limited to 550 ppm by ICE', the third 'CO 2 limited to 550 ppm by Hybrid Car', the fourth 'CO 2 limited to 550 ppm by Fuel Cell Vehicle (FCV) with Hydrogen produced by conventional Steam Methane Reforming (SMR)' and the fifth 'CO 2 limited to 550 ppm by FCV with Nuclear Produced-Hydrogen'. The energy used for transportation is at present about 25% of the total energy consumption in the world and is expected to be the same in the future, if there is no improvement of energy efficiency for transportation. On this point, the hybrid car shows the much better efficiency, about 2 times better than traditional internal combustion engines. Fuel Cell powered Vehicles are expected to be a key to resolving the combined issue of the environment and energy in this century. The nuclear-produced hydrogen is a better solution than conventional hydrogen production method using steam methane reforming. (author)

  3. A Response to: Global Security, Religion and Education Development--A Crisis for the Field of Comparative and International Education?

    Science.gov (United States)

    Ozanne, Bill

    2011-01-01

    This paper presents the author's response to "Global security, religion and education development: a crisis for the field of comparative and international education?" Prof. Lynn Davies's introduction to the Forum is interesting and provocative, and the author advances his response in the spirit of dialogue by looking at Davies's arguments, the…

  4. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  5. A retrospect of anthropogenic radioactivity in the global marine environment

    DEFF Research Database (Denmark)

    Aarkrog, A.

    1998-01-01

    . The IAEA's IASAP study has evaluated the radiological consequences of these dumpings. In a recent international study (MARDOS) by the IAEA it was concluded that the doses to man from anthropogenic radionuclides in the marine environment are generally one to two orders of magnitude less than the doses from......Man-made radionuclides were introduced into the marine environment in the mid forties with the exploitation of nuclear fission for military purposes. Plutonium production reactors at Hanford, USA, released radioactivity to the Pacific Ocean via the Columbia River. In the former Soviet Union (FSU......) the military nuclear establishment at Cheliabinsk (later MAYAK) a few years later began direct discharging of fission products to the nearby Techa River, which is a part of the Ob river system, and the Arctic Ocean received man made radioactivity. In the 1950s, when atmospheric testing of thermonuclear weapons...

  6. The Global Trends in the Alternative Energetics and Improvement of the State Policy in the Sphere of Fiscal Security: in Search for Equilibrium and Markets

    Directory of Open Access Journals (Sweden)

    Hnedina Kateryna V.

    2017-12-01

    Full Text Available Alternative energetics is an important component of the competitiveness and security of the national economy. Its rapid development over the past 10 years is caused by both the attempts of individual countries to maintain and strengthen their competitive advantage in the world markets and the efforts of international organizations (UN, IRENA, IEA to consolidate different stakeholders to achieve energy and fiscal security, protection of environment and improvement of climate conditions. The article is aimed at generalizing global trends in alternative energetics in the context of development of the State policy in the sphere of fiscal security. A brief overview of the latest trends in the alternative energetics development, most of which focus on identifying the basic sectoral trends, has been provided. However, the issues of fiscal security in the energy sector remain poorly researched, especially in terms of formation of the State policy, consolidating interests of different groups of stakeholders. It has been determined that in the developed countries a significant growth of alternative energetics is caused by the consistent State policy on creation of conditions for formation of effective branch markets and the solving of so-called energy trilemma.

  7. Executive Perceptions on International Education in a Globalized Environment: The Travel Industry's Point of View

    Science.gov (United States)

    Munoz, J. Mark; Katsioloudes, Marios I.

    2004-01-01

    Research on globalization has determined travel executives' perceptions of the psychological implications brought about by an interconnected global environment and the implications on international education. With the concepts of Clyne and Rizvi (1998) and Pittaway, Ferguson, and Breen (1998) on the value of cross-cultural interaction as a…

  8. Communication Policies Reflection on Globalization Process and the Role of Advertisement in Integrated Communication Environment

    OpenAIRE

    ÖZKAN, Abdullah

    2012-01-01

    Globalization process has created important changes and transformations across the world. These political, social, economic and cultural changes have considerably affected communication. The number of mass media instruments have increased, informatics has improved and also reaching information has become easier after the globalization of communication. New communication instruments and environments have been created. Globalised communication has also affected people, reaching the information ...

  9. Global food chains and environment: agro-food production and processing in Thailand

    NARCIS (Netherlands)

    Sriwichailamphan, T.H.

    2007-01-01

    In this study on the global food chain and the environment, the objective is to understand the dynamics of food safety and environmental improvements among the large and medium-sized agro-food processing industries and farmers in Thailand that operate in the global market. This study assesses

  10. Expansion of plants with Crassulacean Acid Metabolism under global environment change

    Science.gov (United States)

    Yu, K.; D'Odorico, P.; Collins, S. L.; Carr, D.

    2016-12-01

    contrast to the case of the strong competitive effect from B. mollis. Overall, these research improves understanding of mechanisms underlying the expansion of CAM plants with important implications on shifts in dryland vegetation composition, bioenergy production, food security, and adaptation to global environment change.

  11. Beneficial impacts of an international grain reserve on global food security

    Science.gov (United States)

    Otto, C.; Schewe, J.; Puma, M. J.; Frieler, K.

    2017-12-01

    Highly volatile food prices on global markets challenge food security. Only in the last decade, two pronounced food price spikes severely affected vulnerable populations worldwide by increasing malnutrition and hunger. This has stirred up the debate upon the usefulness of an international grain reserve. Whereas advocates argue that it could damp damaging price extremes, opponents question its effectiveness and are concerned about associated market distortions and costs. However, to our knowledge, a comprehensive quantitative assessment is still missing. For this purpose, we introduce an agent-based dynamic multi-regional model that consistently accounts for intra-annual strategic as well as commercial storage holding. For the case of wheat, we first show that the model is able to reproduce historical world market prices (see Fig. 1(a)) and regional ending stocks (stocks see Fig.1(b) for global ending stocks) from 1980 to the present. Having a bi-annual timestep, the model enables us to single out the main drivers of past short-term price volatility: regional, mainly weather induced, production variations followed by trade policies as the second most important driver. The latter include, both, long-term stockholding management decisions as well as short-term regional political responses to scarcity situations such as export restrictions and restocking attempts. We then quantitatively model a strategic wheat reserve managed by an international body such as the UN. We discuss a management scheme for the reserve that aims at stabilizing prices within a price band by buying at low and selling at high prices (cf. Fig. 1). Importantly, in order to minimize market distortions, this scheme is not designed to damp out price volatility completely, but to merely avoid damaging price extremes. Thus, it preserves the incentive for producers to invest in agricultural development and it can only complement and not replace local efforts to increase the food system's resilience

  12. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  13. Features of the Institutional Structure of the Polish Stock Market under Conditions of Transformational Changes in the Global Financial Environment

    Directory of Open Access Journals (Sweden)

    Goncharenko Nataliia I.

    2017-03-01

    Full Text Available Under modern conditions of transformational changes in the global financial environment, the international stock market acquires stable features of activization of investment activity, formation of a large network of professional participants in the stock market and its multi-level institutional structure, expansion of the range of trade in securities, access of economic entities of different countries to financial resources and diversification of mechanisms of concentration, etc. There conducted a study of peculiarities of the institutional structure of the Polish stock market in the context of transformational changes in the global economic system. The factors influencing the volume of capitalization of the Warsaw Stock Exchange are analyzed; the dependence of the capitalization of the Exchange on foreign portfolio investments in shares of Polish issuers is revealed. Based on the results of own calculations of multiple correlation coefficients, the level of dependence between capital stock market indicators and assets of such financial institutions in Poland as investment and open pension funds, insurance companies is determined, and a significant interconnection of assets of investment and open pension funds and insurance companies is revealed. The obtained results can become a basis for institutional investors in the process of making effective decisions on expanding the range of trading in securities.

  14. [Disembedding and remoralization. Old age security and intergenerational relations in globalized welfare capitalism].

    Science.gov (United States)

    Leisering, L

    2002-08-01

    The article reconstructs the changes in provision for old age since the 19th century with regard to the ensuing change in intergenerational relationships. The first finding is a broadening of the arenas of provision for old age, a historical cumulation of family (which is still relevant), welfare state and, increasingly, private provision in financial markets, adding up to a 'welfare mix' in old age. This implies a complexification of intergenerational relationships. The second finding is an ambivalent qualitative change: on the one hand relationships between generations become more anonymous and disembedded from primary social relationships; on the other hand they are politicized (they become a public issue) and remoralized. This ambivalence applies to bureaucratic provision for old age in the welfare state, i.e., to social insurance. The main thesis is that--contrary to neoliberal belief--private old-age security in global financial markets cannot be seen as individualistic and moral-free but constitutes an anonymous exchange relationship between generations on financial markets that also raises issues of intergenerational justice. We can expect that these abstract relationships between generations will be politicized and remoralized as a consequence. Welfare state and financial markets offer solutions to problems of previous forms of provision for old age but they also produce new problems of intergenerational relationships.

  15. Preparing Information Systems (IS) Graduates to Meet the Challenges of Global IT Security: Some Suggestions

    Science.gov (United States)

    Sauls, Jeff; Gudigantala, Naveen

    2013-01-01

    Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…

  16. Energy and the environment. A global view and strategies

    International Nuclear Information System (INIS)

    Pasztor, J.

    1988-01-01

    It should be recognized that the key to the future is in the rational use of energy, that is, a more efficient use of energy rather than a continuous increase in the supply of energy. Every unit of energy saved is a unit of energy which does not have to be produced, and whose environmental impacts do not have to be dealt with. Massive reductions in the growth rates, and, where possible, in the absolute use of energy will help us to gain time to better understand and develop response strategies to problems like climate change on the acidification of the environment. In this sense the rational use of energy, including intensified energy efficiency measures is the most environmentally sound energy option with which we should move into the next century. 25 refs., 4 figs

  17. The dynamics of accounting terms in a globalized environment

    DEFF Research Database (Denmark)

    Fuertes-Olivera, Pedro A.; Nielsen, Sandro

    2014-01-01

    European accounting terminology is dynamic as term creation occurs on national, European Union and international levels. English is the lingua franca of accounting, which influences terminologies in other languages, usually through the work of translators, e.g. the translation of existing interna...... into Spanish; and the presence of novel metaphors in Spanish accounting. The data used in the discussion are taken from the accounting dictionaries, a collection of online dictionaries in three languages: Danish, English and Spanish.......European accounting terminology is dynamic as term creation occurs on national, European Union and international levels. English is the lingua franca of accounting, which influences terminologies in other languages, usually through the work of translators, e.g. the translation of existing...... international accounting standards. The combined influence of these forces is discussed in this chapter that explains the existence of a globalized trend towards a kind of cultural uniformity. This manifests itself in many ways, two of which are: the translation of English multiword accounting terms...

  18. The Global Environment Facility (GEF): Right mechanism for improved implementation?

    Energy Technology Data Exchange (ETDEWEB)

    Andresen, Steinar; Rosendal, Kristin G.

    2012-11-01

    The purpose is to feed into the international discussions of environmental financial mechanisms such as for forestry and mercury by examining the performance of the GEF. We discuss performance against effectiveness and legitimacy and focus on institutional set-up and key actors as explanatory factors. Methodologically, we use document and literature analysis and interviews with key actors in organizations, state representatives and NGOs. The dominant position of the USA and the World Bank has probably contributed to the bias towards a northern environmental agenda and emphasis on effectiveness and climate change projects. The GEF has somewhat predictably diverted the flow of international money from the poorest countries to more rapidly developing countries. Still, despite turf battles between the organizations involved, the broad organisational and thematic composition of the GEF has comparative advantages. This enhances the score on legitimacy especially for biodiversity projects, although they receive less overall funding. The GEF may be seen as an indication of how, regardless of choosing established or new institutions, basic power structures and interests of dominating parties will be largely decisive for what can be achieved in global environmental governance.(auth)

  19. Strengthening Safety Culture as an Overriding Priority, in Achieving Global Nuclear Security Approach

    International Nuclear Information System (INIS)

    Kolundzija, V.

    2006-01-01

    In the IAEA glossary safety culture is defined as the assembly of characteristics and attitudes in organizations and individuals, which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance. It has been observed that a safety culture, as a part of both security and safety, possesses a few obstacles that should be noticed: safety culture cannot be directly regulated; variation in national cultures means that what constitutes as a good approach to enhancing safety culture in one country may not be the best approach in another. Three stages have been identified in developing and strengthening safety culture: 1 A technical issue (rules and regulations)/ first stage 2 Good safety performance (primarily in terms of safety targets or goals)/ second stage 3 A continuing process of improvement to which everyone can contribute/ third stage There are several key issues in safety culture, such as: a commitment, use of procedures, a conservative decision making (STAR) a reporting culture. Organizations and individuals should have attention on these. Overall common goals are to achieve and maintain a high level of safety and security of radioactive sources as well as facilities. Measures that are concerned on safeguards restrict access to the radioactive sources, conditioning and/or recycling of sources, and systems for detection the passage of the radioactive sources at strategic points, have gained main support. The main partners in implementation these measures are: IAEA, USA, Russian Federation, G8- Global Partnership, and European Union The member states of the IAEA have at their disposal internationally agreed standards. Current differences in applying standards in the IAEA member states are mainly related to state preparedness to cope with demands. Developing and less developed countries with small and medium nuclear programmes have difficulties to accept rules and regulations, to establish

  20. Impacts of ozone-vegetation coupling and feedbacks on global air quality, ecosystems and food security

    Science.gov (United States)

    Tai, A. P. K.

    2016-12-01

    Surface ozone is an air pollutant of significant concerns due to its harmful effects on human health, vegetation and crop productivity. Chronic ozone exposure is shown to reduce photosynthesis and interfere with gas exchange in plants, thereby influencing surface energy balance and biogeochemical fluxes with important ramifications for climate and atmospheric composition, including possible feedbacks onto ozone itself that are not well understood. Ozone damage on crops has been well documented, but a mechanistic understanding is not well established. Here we present several results pertaining to the effects of ozone-vegetation coupling on air quality, ecosystems and agriculture. Using the Community Earth System Model (CESM), we find that inclusion of ozone damage on plants reduces the global land carbon sink by up to 5%, while simulated ozone is enhanced by up to 6 ppbv North America, Europe and East Asia. This strong positive feedback on ozone air quality via ozone-vegetation coupling arises mainly from reduced stomatal conductance, which induces two feedback pathways: 1) reduced dry deposition and ozone uptake; and 2) reduced evapotranspiration that enhances vegetation temperature and thus isoprene emission. Using the same ozone-vegetation scheme in a crop model within CESM, we further examine the impacts of historical ozone exposure on global crop production. We contrast our model results with a separate statistical analysis designed to characterize the spatial variability of crop-ozone-temperature relationships and account for the confounding effect of ozone-temperature covariation, using multidecadal global datasets of crop yields, agroclimatic variables and ozone exposures. We find that several crops (especially C4 crops such as maize) exhibit stronger sensitivities to ozone than found by field studies or in CESM simulations. We also find a strong anticorrelation between crop sensitivities and average ozone levels, reflecting biological adaptive ozone

  1. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  2. Insights for the third Global Environment Outlook from related global scenario anlayses. Working paper for GEO-3

    OpenAIRE

    Bakkes JA; Goldewijk CGM; Meijer JR; Rothman DS; Vries HJM de; Woerden JW van; United Nations Environment Programme (UNEP); MNV

    2001-01-01

    This report relates to the ongoing development of scenarios for the third Global Environment Outlook (GEO-3) of UNEP. It illustrates the scale and type of environmental impacts that GEO-3 needs to consider. It does so by quantifying impacts using existing, recent studies whose scenarios come closest to the current tentative global storylines for GEO-3. With a view to GEO-3;s envisaged role as input for the Rio+10 Earth Summit in 2002, this report suggests a focus for the GEO-3 scenario analys...

  3. Global assessments of the state of the marine environment: Contemporary initiatives

    International Nuclear Information System (INIS)

    Bewers, J.M.; Boelens, R.G.V.

    1999-01-01

    A large number of assessments of regional marine areas have been conducted in recent years for a variety of purposes. Periodic reviews of the state of the marine environment have been undertaken by the United Nations Joint Group of Experts on the Scientific Aspects of Marine Environmental Protection (GESAMP). The most recent of these global assessments was published in 1990. The international adoption of a Global Programme of Action for the Protection of the Marine Environment from Land-Based Activities in 1995 has led to additional demand for regional assessments and a global review. The regional assessments are either completed or in train largely through mechanisms associated with the UNEP Regional Seas Programme. The global assessment has been assigned to GESAMP and incorporated into its plans for the preparation of a new global review to be completed in the year 2002. The Intergovernmental Oceanographic Commission, (IOC) the Scientific Committee for Oceanic Research (SCOR) and the Scientific Committee on Problems of the Environment (SCOPE) are collaborating in a review of ocean science. The Global Environment Facility (GEF) recently approved funding for a 'Global International Waters Assessment' (GIWA) partly as a means of determining priorities within its International Waters Portfolio. This paper outlines the nature of, and contemporary activities within, these various assessments. (author)

  4. Developing Global Leaders: Building Effective Global- Intercultural Collaborative Online Learning Environments

    Science.gov (United States)

    Ivy, Karen Lynne-Daniels

    2017-01-01

    This paper shares the findings of a study conducted on a virtual inter-cultural global leadership development learning project. Mixed Methods analysis techniques were used to examine the interviews of U.S. and Uganda youth project participants. The study, based on cultural and social constructivist learning theories, investigated the effects of…

  5. Fractal Eaarth: Visualizing the Global Environment in the Anthropocene

    Directory of Open Access Journals (Sweden)

    Lekan, Thomas

    2014-11-01

    Full Text Available This essay offers a postcolonial critique of recent environmentalist literature and exhibitions that frame the Anthropocene using the NASA Apollo mission’s Earthrise (1968 and Blue Marble (1972 photographs from space. Building on the work of Dennis Cosgrove and Donna Haraway, as well as historical evidence from the U.N. Environmental Summit in Stockholm in 1972, the essay explores how the attempt to depict Anthropos as a unitary geophysical agent resurrects the appeal to the Whole Earth environmentalism of the 1970s without attending to the U.S. imperialist and racist connotations of the disembodied “god trick” found in these extraterrestrial photographs. As evidenced already in the 1950s at the landmark Man and Nature conference at Princeton and in the wildlife documentaries of Bernhard and Michael Grzimek, moreover, the first decades of the Great Acceleration witnessed the growing use of aerial images to chart the “disappearance of the outside” and to advocate for wilderness areas in the Global South as a “cultural heritage of mankind.” The confluence of geophysical tipping points, universalist history, and political struggle over decolonization resulted in eco-images that subsumed all parts of the globe—most especially Africa—into a doomsday narrative of human profligacy that lost sight of a kaleidoscopic patchwork of cultural landscapes. Fractal topographies, by contrast, serve as more effective indices of the recursive layering found in digital representations such as Google Earth and help us to stretch our historical imagination and cultural criticism into scale-dependent and multi-agentic realms that lie beyond the Apollonian visions of the late Holocene.

  6. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  7. NATO Advanced Study Institute on Laser Control & Monitoring in New Materials, Biomedicine, Environment, Security & Defense

    CERN Document Server

    Hall, Trevor J; Paredes, Sofia A; Extreme Photonics & Applications

    2010-01-01

    "Extreme Photonics & Applications" arises from the 2008 NATO Advanced Study Institute in Laser Control & Monitoring in New Materials, Biomedicine, Environment, Security and Defense. Leading experts in the manipulation of light offered by recent advances in laser physics and nanoscience were invited to give lectures in their fields of expertise and participate in discussions on current research, applications and new directions. The sum of their contributions to this book is a primer for the state of scientific knowledge and the issues within the subject of photonics taken to the extreme frontiers: molding light at the ultra-finest scales, which represents the beginning of the end to limitations in optical science for the benefit of 21st Century technological societies. Laser light is an exquisite tool for physical and chemical research. Physicists have recently developed pulsed lasers with such short durations that one laser shot takes the time of one molecular vibration or one electron rotation in an ...

  8. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  9. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Weizhe Zhang

    2013-01-01

    Full Text Available Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  10. Final Report: 03-LW-005 Space-Time Secure Communications for Hostile Environments

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Poggio, A J; Chambers, D H; Guidry, B L; Robbins, C L; Hertzog, C A; Dowla, F; Burke, G; Kane, R

    2005-10-31

    The development of communications for highly reverberative environments is a major concern for both the private and military sectors whether the application is aimed at the securing a stock order or stalking hostile in a tunnel or cave. Other such environments can range from a hostile urban setting populated with a multitude of buildings and vehicles to the simple complexity of a large number of sound sources that are common in the stock exchange, or military operations in an environment with a topographic features hills, valleys, mountains or even a maze of buried water pipes attempting to transmit information about any chemical anomalies in the water system servicing a city or town. These inherent obstructions cause transmitted signals to reflect, refract and disperse in a multitude of directions distorting both their shape and arrival times at network receiver locations. Imagine troops attempting to communicate on missions in underground caves consisting of a maze of chambers causing multiple echoes with the platoon leader trying to issue timely commands to neutralize terrorists. This is the problem with transmitting information in a complex environment. Waves are susceptible to multiple paths and distortions created by a variety of possible obstructions, which may exist in the particular propagation medium. This is precisely the communications problem we solve using the physics of wave propagation to not only mitigate the noxious effects created by the hostile medium, but also to utilize it in a constructive manner enabling a huge benefit in communications. We employ time-reversal (T/R) communications to accomplish this task. This project is concerned with the development of secure communications techniques that can operate even in the most extreme conditions while maintaining a secure link between host and client stations. We developed an approach based on the concept of time-reversal (T/R) signal processing. In fact, the development of T/R communication

  11. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  12. Rapid emergence of pathogens in agro-ecosystems: global threats to agricultural sustainability and food security.

    Science.gov (United States)

    McDonald, Bruce A; Stukenbrock, Eva H

    2016-12-05

    Agricultural ecosystems are composed of genetically depauperate populations of crop plants grown at a high density and over large spatial scales, with the regional composition of crop species changing little from year to year. These environments are highly conducive for the emergence and dissemination of pathogens. The uniform host populations facilitate the specialization of pathogens to particular crop cultivars and allow the build-up of large population sizes. Population genetic and genomic studies have shed light on the evolutionary mechanisms underlying speciation processes, adaptive evolution and long-distance dispersal of highly damaging pathogens in agro-ecosystems. These studies document the speed with which pathogens evolve to overcome crop resistance genes and pesticides. They also show that crop pathogens can be disseminated very quickly across and among continents through human activities. In this review, we discuss how the peculiar architecture of agro-ecosystems facilitates pathogen emergence, evolution and dispersal. We present four example pathosystems that illustrate both pathogen specialization and pathogen speciation, including different time frames for emergence and different mechanisms underlying the emergence process. Lastly, we argue for a re-design of agro-ecosystems that embraces the concept of dynamic diversity to improve their resilience to pathogens. This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'. © 2016 The Author(s).

  13. Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Hicham Toumi

    2017-03-01

    Full Text Available Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA and network intrusion detection system (NIDS. Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts

  14. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  15. Change in ocean subsurface environment to suppress tropical cyclone intensification under global warming

    Science.gov (United States)

    Huang, Ping; Lin, I. -I; Chou, Chia; Huang, Rong-Hui

    2015-01-01

    Tropical cyclones (TCs) are hazardous natural disasters. Because TC intensification is significantly controlled by atmosphere and ocean environments, changes in these environments may cause changes in TC intensity. Changes in surface and subsurface ocean conditions can both influence a TC's intensification. Regarding global warming, minimal exploration of the subsurface ocean has been undertaken. Here we investigate future subsurface ocean environment changes projected by 22 state-of-the-art climate models and suggest a suppressive effect of subsurface oceans on the intensification of future TCs. Under global warming, the subsurface vertical temperature profile can be sharpened in important TC regions, which may contribute to a stronger ocean coupling (cooling) effect during the intensification of future TCs. Regarding a TC, future subsurface ocean environments may be more suppressive than the existing subsurface ocean environments. This suppressive effect is not spatially uniform and may be weak in certain local areas. PMID:25982028

  16. The Sustainable Development Goals and the Global Health Security Agenda: exploring synergies for a sustainable and resilient world.

    Science.gov (United States)

    Bali, Sulzhan; Taaffe, Jessica

    2017-05-01

    Both the Sustainable Development Goals (SDGs) and the Global Health Security Agenda (GHSA) represent bold initiatives to address systematically gaps in previous efforts to assure that societies can be resilient when confronted with potentially overwhelming threats to health. Despite their obvious differences, and differing criticisms of both, they shift away from vertical (problem- or disease-specific) to horizontal (comprehensive) solutions. Despite the comprehensiveness of the SDGs, they lack a specific target for global health security. The GHSA focuses primarily on infectious diseases and neglects non-communicable diseases and socioeconomic drivers of health. Even though each agenda has limitations and unique challenges, they are complementary. We discuss ways to understand and implement the two agendas synergistically to hasten progress toward a more sustainable and resilient world.

  17. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2007-01-01

    Why this book on the Physics of Societal Issues? The subdivisions of physics - nuclear physics, particle physics, condensed-matter physics, biophysics - have their textbooks, while the subdivision of physics and society lacks an equation-oriented text on the physics of arms, energy and the environment. Physics of Societal Issues is intended for undergraduate and doctoral students who may work on applied topics, or who simply want to know why things are the way they are. Decisions guiding policies on nuclear arms, energy and the environment often seem mysterious and contradictory. What is the science behind the deployment of MIRVed ICBMs, the quest for space-based beam weapons, the fear of powerline EM fields, the wholesale acceptance of SUVs, the issues of climactic change, and the failure of the pre-embargo market to produce buildings and appliances that now save over 50 power plants? Physics of Societal Issues is three "mini-texts" in one: National Security (5 chapters): Weapons, offense, defense, verificat...

  18. An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment

    OpenAIRE

    Pritesh Jain; Vaishali Chourey; Dheeraj Rane

    2011-01-01

    Cloud Computing has emerged as a major information and communications technology trend and has been proved as a key technology for market development and analysis for the users of several field. The practice of computing across two or more data centers separated by the Internet is growing in popularity due to an explosion in scalable computing demands. However, one of the major challenges that faces the cloud computing is how to secure and protect the data and processes the data of the user. ...

  19. Laboratory and software applications for clinical trials: the global laboratory environment.

    Science.gov (United States)

    Briscoe, Chad

    2011-11-01

    The Applied Pharmaceutical Software Meeting is held annually. It is sponsored by The Boston Society, a not-for-profit organization that coordinates a series of meetings within the global pharmaceutical industry. The meeting generally focuses on laboratory applications, but in recent years has expanded to include some software applications for clinical trials. The 2011 meeting emphasized the global laboratory environment. Global clinical trials generate massive amounts of data in many locations that must be centralized and processed for efficient analysis. Thus, the meeting had a strong focus on establishing networks and systems for dealing with the computer infrastructure to support such environments. In addition to the globally installed laboratory information management system, electronic laboratory notebook and other traditional laboratory applications, cloud computing is quickly becoming the answer to provide efficient, inexpensive options for managing the large volumes of data and computing power, and thus it served as a central theme for the meeting.

  20. Data on the global environment. The state of Denmark's environment compared with other industrial countries

    International Nuclear Information System (INIS)

    1995-01-01

    A summary, and a selection of significant information, taken from the OECD (Organization for Economic Co-operation and Development) documents: The State of the Environment (1991) and Environmental Indicators (1991) and the ECE (United Nations Economic Commission for Europe) report: The Environment in Europe and North America: Annotated Statistics 1992, and from a few other sources. The document is a translation of the Swedish publication: Miljoevaer(l)den. Statistics and other information relate to air pollution, flora and fauna, the condition of forests and of the North and Baltic Seas, water pollution, wastes, chemicals, oil spills, energy production and consumption, traffic, environmental hazards, public anxiety related to the environment, environmental protection, population densities during 1989 and international conventions on environmental protection. Most of the datas relate to the nineteen eighties. (AB)

  1. The Role of Divine Revelation and Religious Teachings in Human Rights System: Security and Global Peace

    Directory of Open Access Journals (Sweden)

    Mahmoud Ghayyoum Zadeh

    2009-03-01

    Full Text Available Peace and security have always been considered as one of man’s concerns. The basis of peace and security should be sought in the theoretical foundations. However, the drafters of universal human rights have struggled to attain peace and security away from religious principles. The present article intends to introduce universal human rights in the light of religious teachings and elaborate on the related religious principles. It also deals with the distinctions between the principles governing the present world with regard to human rights and religious principles to show that if religious principles are seriously followed in the international relations, they will bring about perpetual peace and security for mankind. Therefore, Religion has a unique role in peace and security.

  2. The Dynamic VPN Controller. Secure Information Sharing in a Coalition Environment

    Science.gov (United States)

    2005-03-01

    coalitionName=" COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress...34 COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress>10.1.1.1

  3. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  4. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John

    2015-01-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  5. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.

    2015-12-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  6. American perspectives on security : energy, environment, nuclear weapons, and terrorism : 2010.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK); Silva, Carol L. (University of Oklahoma, Norman, OK)

    2011-03-01

    We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findings from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  7. American perspectives on security: energy, environment, nuclear weapons, and terrorism: 2010

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2011-01-01

    We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findings from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  8. Climate change damage functions in LCA – (1) from global warming potential to natural environment damages

    DEFF Research Database (Denmark)

    Callesen, Ingeborg; Hauschild, Michael Zwicky; Bagger Jørgensen, Rikke

    Energy use often is the most significant contributor to the impact category ‘global warming’ in life cycle impact assessment. However, the potential global warming effects on the climate at regional level and consequential effects on the natural environment are not thoroughly described within LCA...... methodology. The current scientific understanding of the extent of climate change impacts is limited due to the immense complexity of the multi-factorial environmental changes and unknown adaptive capacities at process, species and ecosystem level. In the presentation we argue that the global warming impacts...

  9. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael Conrad [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pshakin, Gennady [Obninsk Institute of Physics and Power Engineering (Russian Federation)

    2015-02-23

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  10. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    International Nuclear Information System (INIS)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad; Pshakin, Gennady

    2015-01-01

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  11. The thermal environment of the human being on the global scale

    OpenAIRE

    Jendritzky, Gerd; Tinz, Birger

    2009-01-01

    Background: The close relationship between human health, performance, well-being and the thermal environment is obvious. Nevertheless, most studies of climate and climate change impacts show amazing shortcomings in the assessment of the environment. Populations living in different climates have different susceptibilities, due to socio-economic reasons, and different customary behavioural adaptations. The global distribution of risks of hazardous thermal exposure has not been analysed before. ...

  12. Hardware security and trust design and deployment of integrated circuits in a threatened environment

    CERN Document Server

    Chaves, Ricardo; Natale, Giorgio; Regazzoni, Francesco

    2017-01-01

    This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers. Covers all aspects of hardware security including design, manufacturing, testing, reliability, validation and utilization; Describes new methods and algorithms for the identification/detection of hardware trojans; Defines new architectures capable o...

  13. Protecting America's economy, environment, health, and security against invasive species requires a strong federal program in systematic biology

    Science.gov (United States)

    Hilda Diaz-Soltero; Amy Y. Rossman

    2011-01-01

    Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...

  14. Remote sensing evaluation of fire hazard : Towards operational tools for improving the security of citizens and protecting the environment

    NARCIS (Netherlands)

    Maffei, C.; Gambardella, C.; Menenti, M.

    2015-01-01

    Forest fires are a threat for both the environment and the security of citizens. This is particularly relevant in the Mediterranean, where the population density is high, and long dry summers drive vegetation into fireprone conditions. Policy makers underline the key role of prevention over damage

  15. Networking of research information on global environment protection technologies; Chikyu kankyo taisaku gijutsu no kenkyu joho network jigyo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Networking is being executed with an objective of exchanging information on global environment technologies at an international level. In order to further promote the information exchange, and to make web sites user-friendly, fiscal 1998 has performed structuring a thesis renewal system. As a result of structuring the thesis renewal system, researchers can use the system as using a word processor by inputting data from a terminal in their laboratories. The data can also be made into a data base nearly semi-automatically. In addition to reducing time loss, delay and input errors because of re-entry, the researchers can make the data into a database on nearly a real time basis, and can provide their own theses to any part of the world through Internet. With regard to retaining Internet security, the security software having been introduced last year was renewed. In addition, detailed status such as daily access has become possible of identification as a result of introducing the net intellect. (NEDO)

  16. Towards an integrative post-2015 sustainable development goal framework: Focusing on global justice – peace, security and basic human rights

    Directory of Open Access Journals (Sweden)

    George R. Lueddeke

    2015-12-01

    To strengthen the likelihood of realizing the post-2015 Sustainable Development Goals (SDGs, particularly with regard to “planet and population” health and well-being , UN and other decision-makers are urged to consider the adoption of an integrated SDG framework that is based on (i a vision of global justice - underpinned by peace, security and basic human rights; (ii the development of interdependent and interconnected strategies for each of the eleven thematic indicators identified in the UN document The World We Want; and (iii the application of guiding principles to measure the impact of SDG strategies in terms of holism, equity, sustainability, ownership, and global obligation. While current discussions on the SDGs are making progress in a number of areas, the need for integration of these around a common global vision and purpose seems especially crucial to avoid MDG shortcomings.

  17. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  18. Development of building security integration system using sensors, microcontroller and GPS (Global Positioning System) based android smartphone

    Science.gov (United States)

    Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.

    2018-03-01

    Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.

  19. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  20. The U.S. Role in Global Security: The Mayo Clinic, Not the Emergency Room

    National Research Council Canada - National Science Library

    Hillen, John

    1998-01-01

    While many different proposals have been put forward outlining a post-Cold War security identity for the United States, most do not characterize an American role in terms of either excessive activism...

  1. Enhancing food security through a multi-stakeholder process: the global agenda for sustainable livestock

    NARCIS (Netherlands)

    Breeman, G.E.; Dijkman, J.; Termeer, C.J.A.M.

    2015-01-01

    Feeding the world is not only a complex technical matter, but also a demanding governance issue. As food security has all the characteristics of a wicked problem (variety of problem definitions, conflicting interests, interconnectedness across scales, inherent uncertainties), conventional governance

  2. AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps

    OpenAIRE

    Chen, Sen; Meng, Guozhu; Su, Ting; Fan, Lingling; Xue, Yinxing; Liu, Yang; Xu, Lihua; Xue, Minhui; Li, Bo; Hao, Shuang

    2018-01-01

    Contemporary financial technology (FinTech) that enables cashless mobile payment has been widely adopted by financial institutions, such as banks, due to its convenience and efficiency. However, FinTech has also made massive and dynamic transactions susceptible to security risks. Given large financial losses caused by such vulnerabilities, regulatory technology (RegTech) has been developed, but more comprehensive security risk assessment is specifically desired to develop robust, scalable, an...

  3. Initiating Joint Chinese-U.S. Activities on Biological Safety and Global Health Security

    OpenAIRE

    Center on Contemporary Conflict

    2014-01-01

    Performer: National Academy of Sciences (NAS) Principal Investigator: Benjamin J. Rusek Cost: $125,000 Fiscal Year(s): 2014-2015 China is critically important to international health and biological security efforts, yet awareness and implementation of biosafety and biosecurity practices are inconsistent among life science researchers and others working with pathogens and dual-use biotechnology in China. In late 2012, the Committee on International Security and Arms ...

  4. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  5. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2014-01-01

    This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues:   •        National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism •        Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology •        Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable  Energy, Enhanced End-Use Efficiency, Transportation, Economics   Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science...

  6. Key Based Mutual Authentication (KBMA Mechanism for Secured Access in MobiCloud Environment

    Directory of Open Access Journals (Sweden)

    Donald A. Cecil

    2016-01-01

    Full Text Available Mobile Cloud Computing (MCC fuels innovation in Mobile Computing and opens new pathways between mobile devices and infrastructures. There are several issues in MCC environment as it integrates various technologies. Among all issues, security lies on the top where many users are not willing to adopt the cloud services. This paper focuses on the authentication. The objective of this paper is to provide a mechanism for authenticating all the entities involved in accessing the cloud services. A mechanism called Key Based Mutual Authentication (KBMA is proposed which is divided into two processes namely registration and authentication. Registration is a one-time process where the users are registered for accessing the cloud services by giving the desired unique information. Authentication process is carried out mutually to verify the identities of Device and Cloud Service Provider (CSP. Scyther tool is used for analysing the vulnerability in terms of attacks. The result claims show that the proposed mechanism is resilient against various attacks.

  7. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  8. The Comprehensive Approach to Assessing the Economic Security of the Industry Sector in Conditions of Globalization

    Directory of Open Access Journals (Sweden)

    Denysov Oleg Ye.

    2018-01-01

    Full Text Available The author carries out an empirical study of the level of economic security of the chemical industry sector of Ukraine in the direction of «production of polyvinyl chlorides». For this purpose the integral index of economic security has been calculated according to the model of functional-component blocks of economic security of sector, developed by the author. Application of this model allowed to research the algorithm of action of the model on the factual basis and to analyze the obtained indicators. This, in turn, made possible to draw a conclusion about the constructiveness and expediency of application of the model of basic functional-component blocks for calculating the level of economic security of the industry sector. With the help of this approach, with application of the complex, system-structural, dynamic and functional approaches, the level of economic security has been defined and the process of monitoring the status and level of economic security of the industry sector has been ensured.

  9. New Challenges Facing Universities in the Internet-Driven Global Environment

    Science.gov (United States)

    Rajasingham, Lalita

    2011-01-01

    This paper explores some new challenges facing universities in a global multimediated Internet-based environment, as they seek alternative paradigms and options to remain true to their core business. At a time of rapid technological change, and contested, complex concepts associated with globalisation, knowledge is becoming a primary factor of…

  10. Toward an Assessment of the Global Inventory of Present-Day Mercury Releases to Freshwater Environments

    Directory of Open Access Journals (Sweden)

    David Kocman

    2017-02-01

    Full Text Available Aquatic ecosystems are an essential component of the biogeochemical cycle of mercury (Hg, as inorganic Hg can be converted to toxic methylmercury (MeHg in these environments and reemissions of elemental Hg rival anthropogenic Hg releases on a global scale. Quantification of effluent Hg releases to aquatic systems globally has focused on discharges to the global oceans, rather than contributions to freshwater systems that affect local exposures and risks associated with MeHg. Here we produce a first-estimate of sector-specific, spatially resolved global aquatic Hg discharges to freshwater systems. We compare our release estimates to atmospheric sources that have been quantified elsewhere. By analyzing available quantitative and qualitative information, we estimate that present-day global Hg releases to freshwater environments (rivers and lakes associated with anthropogenic activities have a lower bound of ~1000 Mg· a−1. Artisanal and small-scale gold mining (ASGM represents the single largest source, followed by disposal of mercury-containing products and domestic waste water, metal production, and releases from industrial installations such as chlor-alkali plants and oil refineries. In addition to these direct anthropogenic inputs, diffuse inputs from land management activities and remobilization of Hg previously accumulated in terrestrial ecosystems are likely comparable in magnitude. Aquatic discharges of Hg are greatly understudied and further constraining associated data gaps is crucial for reducing the uncertainties in the global biogeochemical Hg budget.

  11. Development of the virtual research environment for analysis, evaluation and prediction of global climate change impacts on the regional environment

    Science.gov (United States)

    Okladnikov, Igor; Gordov, Evgeny; Titov, Alexander; Fazliev, Alexander

    2017-04-01

    Description and the first results of the Russian Science Foundation project "Virtual computational information environment for analysis, evaluation and prediction of the impacts of global climate change on the environment and climate of a selected region" is presented. The project is aimed at development of an Internet-accessible computation and information environment providing unskilled in numerical modelling and software design specialists, decision-makers and stakeholders with reliable and easy-used tools for in-depth statistical analysis of climatic characteristics, and instruments for detailed analysis, assessment and prediction of impacts of global climate change on the environment and climate of the targeted region. In the framework of the project, approaches of "cloud" processing and analysis of large geospatial datasets will be developed on the technical platform of the Russian leading institution involved in research of climate change and its consequences. Anticipated results will create a pathway for development and deployment of thematic international virtual research laboratory focused on interdisciplinary environmental studies. VRE under development will comprise best features and functionality of earlier developed information and computing system CLIMATE (http://climate.scert.ru/), which is widely used in Northern Eurasia environment studies. The Project includes several major directions of research listed below. 1. Preparation of geo-referenced data sets, describing the dynamics of the current and possible future climate and environmental changes in detail. 2. Improvement of methods of analysis of climate change. 3. Enhancing the functionality of the VRE prototype in order to create a convenient and reliable tool for the study of regional social, economic and political consequences of climate change. 4. Using the output of the first three tasks, compilation of the VRE prototype, its validation, preparation of applicable detailed description of

  12. The evolution of central securities depositaries in Europe: stable functions in a changing environment

    OpenAIRE

    Dominique Chabert; Gisèle Chanel-Reynaud

    2006-01-01

    National audience; Settlement-delivery (S&D) operations of CSDs or ICSDs are the second last stage of the securities treatment procedure, the last stage being the delivery of securities into the accounts of the final holders by their account managers/custodians. As for national transfers, the organisation is fairly simple since regional depositors are directly connected to the central securities depositary which fulfils two overriding functions on their behalf:- ensuring the final custody of ...

  13. The United Nations and One Health: the International Health Regulations (2005) and global health security.

    Science.gov (United States)

    Nuttall, I; Miyagishima, K; Roth, C; de La Rocque, S

    2014-08-01

    The One Health approach encompasses multiple themes and can be understood from many different perspectives. This paper expresses the viewpoint of those in charge of responding to public health events of international concern and, in particular, to outbreaks of zoonotic disease. Several international organisations are involved in responding to such outbreaks, including the United Nations (UN) and its technical agencies; principally, the Food and Agriculture Organization of the UN (FAO) and the World Health Organization (WHO); UN funds and programmes, such as the United Nations Development Programme, the World Food Programme, the United Nations Environment Programme, the United Nations Children's Fund; the UN-linked multilateral banking system (the World Bank and regional development banks); and partner organisations, such as the World Organisation for Animal Health (OIE). All of these organisations have benefited from the experiences gained during zoonotic disease outbreaks over the last decade, developing common approaches and mechanisms to foster good governance, promote policies that cut across different sectors, target investment more effectively and strengthen global and national capacities for dealing with emerging crises. Coordination among the various UN agencies and creating partnerships with related organisations have helped to improve disease surveillance in all countries, enabling more efficient detection of disease outbreaks and a faster response, greater transparency and stakeholder engagement and improved public health. The need to build more robust national public human and animal health systems, which are based on good governance and comply with the International Health Regulations (2005) and the international standards set by the OIE, prompted FAO, WHO and the OIE to join forces with the World Bank, to provide practical tools to help countries manage their zoonotic disease risks and develop adequate resources to prevent and control disease

  14. Shotgun Wedding: Interagency Transformation for the 21st Century Security Environment

    National Research Council Canada - National Science Library

    Gibler, Michael L

    2008-01-01

    .... Equally present are the numerous statements and studies by governmental bodies, military leadership, non-partisan think tanks, academia and political elites who believe the current National Security...

  15. Success in Global New Product Development: Impact of Strategy and the Behavioral Environment of the Firm

    DEFF Research Database (Denmark)

    de Brentani, U.; Kleinschmidt, E.J.; Salomo, Søren

    2010-01-01

    Product innovation and the trend toward globalization are two important dimensions driving business today, and a firm's global new product development (NPD) strategy is a primary determinant of performance. Succeeding in this competitive and complex market arena calls for corporate resources...... America and Europe, business-to-business, services and goods), a structural model testing for the hypothesized mediation effects was substantially supported. Specifically, having an organizational posture that, at once, values innovation plus globalization, as well as a senior management that is active...... as primary determinants of competitive advantage and, thus, of superior performance through the strategic initiatives that these enable. In the study, global NPD programs are assessed in terms of three dimensions: (1) the organizational resources or behavioral environment of the firm relevant...

  16. Changes in the Global Energy System: Implications for China's International Strategic Environment

    Directory of Open Access Journals (Sweden)

    Zhang Chi

    2015-12-01

    Full Text Available This article briefly discusses major reasons for the slump of international oil prices and provides a prediction for the future development of international oil prices, before analyzing the three factors leading to significant changes of the global energy system, namely the eastward shift of the world energy consumption centre, the emergence of the United States as a major oil producer and the dramatic waning of the Organization of Petroleum Exporting Countries’ (OPEC influence. These factors and developments are shaping a new order of the global energy strategic landscape and exerting profound influence on China’s international strategic environment. In the foreseeable future, these changes of the global energy system would bring China more uncertainties regarding the country’s oil imports from the Middle East, more strategic pressure from the United States, while promoting China’s leverage on the global energy system and international relations.

  17. Knowledge-inducing Global Path Planning for Robots in Environment with Hybrid Terrain

    Directory of Open Access Journals (Sweden)

    Yi-nan Guo

    2010-09-01

    Full Text Available In complex environment with hybrid terrain, different regions may have different terrain. Path planning for robots in such environment is an open NP-complete problem, which lacks effective methods. The paper develops a novel global path planning method based on common sense and evolution knowledge by adopting dual evolution structure in culture algorithms. Common sense describes terrain information and feasibility of environment, which is used to evaluate and select the paths. Evolution knowledge describes the angle relationship between the path and the obstacles, or the common segments of paths, which is used to judge and repair infeasible individuals. Taken two types of environments with different obstacles and terrain as examples, simulation results indicate that the algorithm can effectively solve path planning problem in complex environment and decrease the computation complexity for judgment and repair of infeasible individuals. It also can improve the convergence speed and have better computation stability.

  18. Nuclear power and the global challenges of energy security, 6 September 2007, London, England, World Nuclear Association Annual Symposium

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    In the Atoms for Peace speech given by US President Eisenhower in 1953 - the speech that paved the way for the creation of the IAEA - he declared that a special purpose of Atoms for Peace would be 'to provide abundant electrical energy in the power-starved areas of the world'. That vision has yet to be realized. And it should not be taken to mean that nuclear power is the solution for all countries, or for all developing countries. But I would reiterate what I said at the outset - that the global challenges of security and development are interlinked, and that addressing the energy security needs of all countries will be a key to progress on both fronts. It is incumbent upon us to see to it that nuclear power will fulfil its potential in addressing these challenges

  19. An obsolete dichotomy? Rethinking the rural–urban interface in terms of food security and production in the global south.

    Science.gov (United States)

    Lerner, Amy M; Eakin, Hallie

    2011-01-01

    The global food system is coming under increasing strain in the face of urban population growth. The recent spike in global food prices (2007–08) provoked consumer protests, and raised questions about food sovereignty and how and where food will be produced. Concurrently, for the first time in history the majority of the global population is urban, with the bulk of urban growth occurring in smaller-tiered cities and urban peripheries, or ‘peri-urban’ areas of the developing world. This paper discusses the new emerging spaces that incorporate a mosaic of urban and rural worlds, and reviews the implications of these spaces for livelihoods and food security. We propose a modified livelihoods framework to evaluate the contexts in which food production persists within broader processes of landscape and livelihood transformation in peri-urban locations. Where and how food production persists are central questions for the future of food security in an urbanising world. Our proposed framework provides directions for future research and highlights the role of policy and planning in reconciling food production with urban growth.

  20. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  1. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  2. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and Transformation of Infectious Disease Control System in South Korea.

    Science.gov (United States)

    Choi, Eun Kyung; Lee, Jong-Koo

    2016-12-01

    This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH) was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC) was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in disease control. The

  3. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and Transformation of Infectious Disease Control System in South Korea

    Directory of Open Access Journals (Sweden)

    Eun Kyung CHOI

    2016-12-01

    Full Text Available This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in

  4. On the merits of plant-based proteins for global food security: Marrying macro and micro perspectives

    NARCIS (Netherlands)

    de Boer, J.; Aiking, H.

    2011-01-01

    This paper aims to demonstrate the importance of protein production for the global environment and to give insight into the way consumers frame the protein part of their meal. Using a macro perspective, it presents a review of the literature on current and future impacts of the nutritional

  5. Enhancing the Security Cooperation Marine Air Ground Task Force to Satisfy the Needs of the Uncertain Global Security Environment

    Science.gov (United States)

    2009-06-12

    and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for

  6. Global Climate Change, Food Security and the U.S. Food System

    Science.gov (United States)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.

  7. EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE

    OpenAIRE

    W. Xian; Y. Chen; J. Chen; X. Luo; H. Shao

    2018-01-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological securi...

  8. Towards adaptive security for convergent wireless sensor networks in beyond 3G environments

    DEFF Research Database (Denmark)

    Mitseva, Anelia; Aivaloglou, Efthimia; Marchitti, Maria-Antonietta

    2010-01-01

    The integration of wireless sensor networks with different network systems gives rise to many research challenges to ensure security, privacy and trust in the overall architecture. The main contribution of this paper is a generic security, privacy and trust framework providing context-aware adapt...

  9. Measuring household food security: the global experience A medida da segurança alimentar: a experiência mundial

    Directory of Open Access Journals (Sweden)

    Hugo Melgar-Quinonez

    2008-08-01

    Full Text Available Measuring household food insecurity represents a challenge due to the complexity and wide array of factors associated with this phenomenon. For over one decade, researchers and agencies throughout the world have been using and assessing the validity of variations of the United States Department of Agriculture Household Food Security Supplemental Module. Thanks to numerous studies of diverse design, size, and purpose, the Household Food Security Supplemental Module has shown its suitability to directly evaluate the perceptions of individuals on their food security status. In addition, challenges and limitations are becoming clearer and new research questions are emerging as the process advances. The purpose of this article is to describe the development, validation procedures, and use of the Household Food Security Supplemental Module in very diverse settings. The most common Household Food Security Supplemental Module related studies have been conducted using criterion validity, Rasch modeling and Cronbach-Alpha Coefficient. It is critical that researchers, policy makers, governmental and non-governmental agencies intensify their efforts to further develop tools that provide valid and reliable measures of food security in diverse population groups. Additional work is needed to synthesize a universally applicable tool able to capture the global human phenomenon of food insecurity.Medir a insegurança alimentar domiciliar representa um desafio devido à complexidade e ao vasto número de fatores associados a este fenômeno. Por mais de uma década, pesquisadores e agências em todo o mundo têm usado o Módulo Suplementar da Segurança Alimentar Domiciliar , do Departamento de Agricultura dos Estados Unidos (Household Food Security Supplemental Module, e avaliado suas variações. Graças a numerosos estudos com diversos formatos, extensões e propósitos, a adequação do Household Food Security Supplemental Module para avaliar diretamente a

  10. Survey on Security Issues in File Management in Cloud Computing Environment

    Science.gov (United States)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  11. Interworking between IP security and NAT-PT under IPv4/IPv6 co-existent environments

    Science.gov (United States)

    Ye, Run-Guo; Yu, Shu-Yao; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    Similar to conventional NAT gateways, NAT-PT gateways break traditional TCP/IP"s end-to-end argument property; hence, any IP-based applications protected by IPSec protocol cannot traverse NAT-PT gateways properly. The interworking issues between IPSec and NAT-PT gateways under IPv4/IPv6 co-existent environments were studied: this paper first pointed out the deficiency of current NAT-Traversal scheme when interworking with NAT-PT gateways and proposed an enhanced scheme, which enabled interworking between IPSec and NAT-PT gateways and served the following three scenarios: 1) secure communication between IPv6 hosts and IPv4 hosts; 2) secure communication between IPv6 subnets and IPv4 subnets; 3) secure communication between remote IPv6 hosts and legacy IPv4 subnets.

  12. Information Processing and Firm-Internal Environment Contingencies: Performance Impact on Global New Product Development

    DEFF Research Database (Denmark)

    Kleinschmidt, Elko; de Brentani, Ulrike; Salomo, Søren

    2010-01-01

    , functionally, geographically and culturally. To this end, an IT-communication strength is essential, one that is nested in an internal organizational environment that ensures its effective functioning. Using organizational information processing (OIP) theory as a framework, superior global NPD program......Innovation in its essence is an information processing activity. Thus, a major factor impacting the success of new product development (NPD) programs, especially those responding to global markets, is the firm's ability to access, share and apply NPD information, which is often widely dispersed...

  13. Global Security in the Twenty First Century - The Challenge to International Organizations, Alliances and Coalitions

    National Research Council Canada - National Science Library

    Seymour, N

    1999-01-01

    ... for Security and Cooperation in Europe (OSCE) Naturally, it would be too simplistic for the answer to be either one or the other; the probable solution is more likely to be a hybrid that embodies the strengths of both, not to mention the UN.

  14. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Microphysical particles such as glass and metal can be hazardous and cause serious injury to consumers. Pathogenic bacteria, viruses and toxins produced by microorganisms are all possible contaminants of food and impact food safety. Like food security, food safety is also effected by poverty and climate change. Hence Foo

  15. Global Security, Religion and Education Development: A Crisis for the Field of Comparative Education?

    Science.gov (United States)

    Sayed, Yusuf; Davies, Lynn; Hardy, Mike; Arani, Abbas Madandar; Kakia, Lida; Bano, Masooda

    2011-01-01

    The above title was suggested by the editors of this journal as being an interesting topic for a forum. It is indeed a valuable one to explore, in that while there has been extensive writing on various connections between security, religion and education (e.g. Apple 2004; Griffin 2006; Merry 2007; Davies 2008), situating this within comparative…

  16. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  17. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  18. The global security perspective on the effects of executive cognitive function on complex behavioral screening intervention and HIV/AIDS.

    Science.gov (United States)

    Kim, Suk-Hee

    2010-11-01

    The purpose of this quantitative study is to understand the global security perspective on the effects of executive cognitive function (ECF) on Complex Behavioral Screening Intervention and HIV/AIDS. The HIV/AIDS pandemic is as much a social, political, economic, and cultural problem as a biomedical one. HIV/AIDS is associated centrally with the collapse not just of communities and families but potentially of states, with some of the largest public health interventions ever and enormous questions about governance, a huge population of orphans, and deep questions about intergenerational relations and cultural transmission. This study also is to develop a screening instrument that improves quality of life for individuals with executive cognitive impairments and behavior problems in our communities and the global society.

  19. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  20. Coordination and organization of security software process for power information application environment

    Science.gov (United States)

    Wang, Qiang

    2017-09-01

    As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.