WorldWideScience

Sample records for global security programs

  1. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  2. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  3. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  4. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  5. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  8. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Science.gov (United States)

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  9. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  10. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  11. Analyzing the greenhouse gas impact potential of smallholder development actions across a global food security program

    Science.gov (United States)

    Grewer, Uwe; Nash, Julie; Gurwick, Noel; Bockel, Louis; Galford, Gillian; Richards, Meryl; Costa Junior, Ciniro; White, Julianna; Pirolli, Gillian; Wollenberg, Eva

    2018-04-01

    This article analyses the greenhouse gas (GHG) impact potential of improved management practices and technologies for smallholder agriculture promoted under a global food security development program. Under ‘business-as-usual’ development, global studies on the future of agriculture to 2050 project considerable increases in total food production and cultivated area. Conventional cropland intensification and conversion of natural vegetation typically result in increased GHG emissions and loss of carbon stocks. There is a strong need to understand the potential greenhouse gas impacts of agricultural development programs intended to achieve large-scale change, and to identify pathways of smallholder agricultural development that can achieve food security and agricultural production growth without drastic increases in GHG emissions. In an analysis of 134 crop and livestock production systems in 15 countries with reported impacts on 4.8 million ha, improved management practices and technologies by smallholder farmers significantly reduce GHG emission intensity of agricultural production, increase yields and reduce post-harvest losses, while either decreasing or only moderately increasing net GHG emissions per area. Investments in both production and post-harvest stages meaningfully reduced GHG emission intensity, contributing to low emission development. We present average impacts on net GHG emissions per hectare and GHG emission intensity, while not providing detailed statistics of GHG impacts at scale that are associated to additional uncertainties. While reported improvements in smallholder systems effectively reduce future GHG emissions compared to business-as-usual development, these contributions are insufficient to significantly reduce net GHG emission in agriculture beyond current levels, particularly if future agricultural production grows at projected rates.

  12. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  13. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  14. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  15. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  16. Global Programs

    Science.gov (United States)

    Lindberg Christensen, Lars; Russo, P.

    2009-05-01

    IYA2009 is a global collaboration between almost 140 nations and more than 50 international organisations sharing the same vision. Besides the common brand, mission, vision and goals, IAU established eleven cornerstones programmes to support the different IYA2009 stakeholder to organize events, activities under a common umbrella. These are global activities centred on specific themes and are aligned with IYA2009's main goals. Whether it is the support and promotion of women in astronomy, the preservation of dark-sky sites around the world or educating and explaining the workings of the Universe to millions, the eleven Cornerstones are key elements in the success of IYA2009. However, the process of implementing global projects across cultural boundaries is challenging and needs central coordination to preserve the pre-established goals. During this talk we will examine the ups and downs of coordinating such a project and present an overview of the principal achievements for the Cornerstones so far.

  17. Northern Security and Global Politics

    DEFF Research Database (Denmark)

    This book takes a comprehensive approach to security in the Nordic-Baltic region, studying how this region is affected by developments in the international system. The advent of the new millennium coincided with the return of the High North to the world stage. A number of factors have contributed......-unipolar", indicating a period of flux and of declining US unipolar hegemony. Drawing together contributions from key thinkers in the field, Northern Security and Global Politics explores how this situation has affected the Nordic-Baltic area by addressing two broad sets of questions. First, it examines what impact...... declining unipolarity - with a geopolitical shift to Asia, a reduced role for Europe in United States policy, and a more assertive Russia - will have on regional Nordic-Baltic security. Second, it takes a closer look at how the regional actors respond to these changes in their strategic environment...

  18. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  19. Global Security Contingency Fund: Summary and Issue Overview

    Science.gov (United States)

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  20. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  1. Canada's Global Partnership Program

    International Nuclear Information System (INIS)

    Ellis, M.

    2007-01-01

    Curbing the proliferation of biological weapons (BW) is an essential element of the Global Partnership Against the Spread of Weapons and Materials of Mass Destruction. At the Kananaskis Summit in June 2002, G8 Leaders committed to prevent terrorists, or those that harbour them, from acquiring or developing biological weapons and related materials, equipment and technology. To this end, Canada's Global Partnership Program is investing heavily in biological non-proliferation activities in countries of the former Soviet Union. A comprehensive strategy has been developed to help improve biological safety (biosafety) and biological security (biosecurity) with provision for addressing dual-use concerns. Raising awareness and creating a self-sustaining culture of biosecurity is a key driver of the program. Through this strategy, Canada is assisting various FSU countries to: develop and implement effective and practical biosafety/biosecurity standards and guidelines; establish national and/or regional biosafety associations; develop and deliver effective biosafety and biosecurity training; put in place enhanced physical security measures and equipment. In addition to biosafety and biosecurity, the GPP supports a broad range of Biological Non-Proliferation projects and initiatives, including dozens of projects aimed at redirecting former biological weapons scientists. To date, most of these activities have been supported through Canada's contribution to the International Science and Technology Center (ISTC) and the Science and Technology Centre Ukraine (STCU).(author)

  2. Coping with Security in Programming

    OpenAIRE

    Frank Schindler

    2006-01-01

    This article deals with importance of security issues in computer programming.Secure software can only be designed with security as a primary goal. To achieve that wewould have to redesign our computer systems with security in our mind including entirecomputer environment, e.g. hardware, programming languages and, of course, operatingsystems. In software development process the quality of resulting computer code should bethe most important aspect during the whole program development process. ...

  3. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  4. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  5. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  6. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  7. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  8. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the arti...

  9. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  10. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  11. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  12. Global climate change and international security

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  13. G-8 leaders tackle global energy security

    International Nuclear Information System (INIS)

    Quevenco, R.

    2006-01-01

    Leaders of the Group of 8 countries backed the IAEA's work at their annual summit held 15-17 July 2006 in St. Petersburg, Russia. A concluding summary statement endorsed IAEA programmes and initiatives in areas of nuclear safety, security, and safeguards. The G8 nations adopted a St. Petersburg Plan of Action to increase transparency, predictability and stability of the global energy markets, improve the investment climate in the energy sector, promote energy efficiency and energy saving, diversify energy mix, ensure physical safety of critical energy infrastructure, reduce energy poverty and address climate change and sustainable development. In a statement on global energy security, the G8 said countries who have or are considering plans for nuclear energy believe it will contribute to global energy security while reducing air pollution and addressing climate change. The G8 said it acknowledged the efforts made in development by the Generation IV International Forum (GIF) and the IAEA's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). GIF and INPRO both bring together countries to develop next generation nuclear energy systems, including small reactors, very high temperature reactors and supercritical water-cooled reactors. The G8 reaffirmed its full commitment to all three pillars of the NPT and called on all States to comply with their NPT obligations, including IAEA safeguards as well as developing effective measures aimed at preventing trafficking in nuclear equipment, technology and materials. The G8 is seeking universal adherence to IAEA comprehensive safeguards agreements and is actively engaged in efforts to make comprehensive safeguards agreements together with an Additional Protocol the universally accepted verification standard. The G8 noted that an expansion of the peaceful use of nuclear energy must be carried forward in a manner consistent with nuclear non-proliferation commitments and standards. It discussed concrete

  14. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  15. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  16. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  17. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  18. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  19. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  20. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  1. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  2. Global Security, Medical Isotopes, and Nuclear Science

    Science.gov (United States)

    Ahle, Larry

    2007-10-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  3. Global Security, Medical Isotopes, and Nuclear Science

    International Nuclear Information System (INIS)

    Ahle, Larry

    2007-01-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R and D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities

  4. Carbon plants nutrition and global food security

    Science.gov (United States)

    Mariani, Luigi

    2017-02-01

    To evaluate the effects of carbon nutrition on agricultural productivity, a physiological-process-based crop simulation model, driven by the 1961-1990 monthly climate data from global FAO dataset, was developed and applied to four crops (wheat, maize, rice and soybean -WMRS) which account for 64% of the global caloric consumption of humans. Five different temperatures and CO2 scenarios (current; glacial; pre-industrial; future_1 with 560 ppmv for CO2 and +2 °C for temperature; and future_2 with 800 ppmv for CO2 and +4 °C) were investigated. The relative values of WMRS global productions for past and future scenarios were, respectively, 49% of the present-day scenario for glacial, 82% for pre-industrial, 115% for future_1 and 124% for future_2. A sensitive growth of productivity of future scenarios (respectively to 117% and 134%) was observed if the northward shift of crops was allowed, and a strong increase was obtained without water limitation (from 151% to 157% for the five scenarios) and without biotic and abiotic stresses (from 30% to 40% for WMRS subject to the current scenario). Furthermore since the beginning of the Green Revolution (roughly happened between the '30s and the '50s of the twentieth century) production losses due to sub-optimal levels of CO2 and to biotic and abiotic stresses have been masked by the strong technological innovation trend still ongoing, which, in the last century, led to a strong increase in the global crop production (+400%-600%). These results show the crucial relevance of the future choices of research and development in agriculture (genetics, land reclamation, irrigation, plant protection, and so on) to ensure global food security.

  5. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... FEDERAL MARITIME COMMISSION 46 CFR Part 503 [Docket No. 11-01] RIN 3072-AC40 Information Security... (FMC or Commission) amends its regulations relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect...

  6. Climate change impacts on global food security.

    Science.gov (United States)

    Wheeler, Tim; von Braun, Joachim

    2013-08-02

    Climate change could potentially interrupt progress toward a world without hunger. A robust and coherent global pattern is discernible of the impacts of climate change on crop productivity that could have consequences for food availability. The stability of whole food systems may be at risk under climate change because of short-term variability in supply. However, the potential impact is less clear at regional scales, but it is likely that climate variability and change will exacerbate food insecurity in areas currently vulnerable to hunger and undernutrition. Likewise, it can be anticipated that food access and utilization will be affected indirectly via collateral effects on household and individual incomes, and food utilization could be impaired by loss of access to drinking water and damage to health. The evidence supports the need for considerable investment in adaptation and mitigation actions toward a "climate-smart food system" that is more resilient to climate change influences on food security.

  7. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  8. Student Dissertation Explores Privatization of Global Security

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2012-01-01

    NPS national security affairs doctoral student Cmdr. Dan Straub weighs the benefits and challenges of using private security contractors for United Nations peacekeeping efforts in his upcoming dissertation.

  9. Globalization Crisis and National Security: A Reflection on Nigeria ...

    African Journals Online (AJOL)

    Globalization Crisis and National Security: A Reflection on Nigeria Textile Industry. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... Thus, while globalization has several palpable positive effects on the countrys industrial growth, it also ...

  10. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  11. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Gender and Food Security in the Global South. Page couverture du livre: Transforming Gender and Food Security in the Global South. Directeur(s):. Jemimah Njuki, John R. Parkins et Amy Kaler. Maison(s) d'édition: Routledge, CRDI. 29 septembre 2016. ISBN : 9781138680418. 312 pages. e-ISBN :.

  12. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  13. ECONOMIC SECURITY – NEW APPROACHES IN THE CONTEXT OF GLOBALIZATION

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2015-08-01

    Full Text Available Nowadays, more than ever, economic relations between states are the ones that define the general character of the relations between them and establish economic security as a concept which cannot be neglected anymore. Globalization, the process that shapes the international environment, undermines the old definition of economic security and forces its redefinition. The article aims to identify and analyse the effects of globalization on economic security and the new approaches it takes in this context.

  14. Global plutonium management: A security option

    International Nuclear Information System (INIS)

    Sylvester, K.W.B.

    1998-01-01

    The US surplus plutonium disposition program was created to reduce the proliferation risk posed by the fissile material from thousands of retired nuclear weapons. The Department of Energy has decided to process its Put into a form as secure as Pu in civilian spent fuel. While implementation issues have been considered, a major one (Russian reciprocity) remains unresolved. Russia has made disposition action conditional on extracting the fuel value of its Pu but lacks the infrastructure to do so. Assistance in the construction of the required facilities would conflict with official US policy opposing the development of a Pu fuel cycle. The resulting stagnation provides impetus for a reevaluation of US nonproliferation objectives and Pu disposition options. A strategy for satisfying Russian fuel value concerns and reducing the proliferation risk posed by surplus weapons-grade plutonium (WGPu) is proposed. The effectiveness of material alteration (e.g., isotopic, chemical, etc.hor-ellipsis) at reducing the desire, ability and opportunity for proliferation is assessed. Virtually all the security benefits attainable by material processing can be obtained by immobilizing Pu in large unit size/mass monoliths without a radiation barrier. Russia would be allowed to extract the Pu at a future date for use as fuel in a verifiable manner. Remote tracking capability, if proven feasible, would further improve safeguarding capability. As an alternate approach, the US could compensate Russia for its Pu, allowing it to be disposed of or processed elsewhere. A market based method for pricing Pu is proposed. Surplus Pu could represent access to nuclear fuel at a fixed price at a future date. This position can be replicated in the uranium market and priced using derivative theory. The proposed strategy attempts to meet nonproliferation objectives by recognizing technical limitations and satisfying political constraints

  15. Maritime Security – The Need for a Global Agreement

    OpenAIRE

    Dinos Stasinopoulos

    2003-01-01

    This note reviews US maritime security measures, outlines work carried out by international organisations and then frames maritime security within the wider context of maritime trade. Finally, it suggests the development of a Global Agreement linking security and other maritime trade-related issues. The initiative for such an agreement should be undertaken by the EU only if current International Maritime Organisation (IMO) efforts fail to produce a maritime security framework with binding req...

  16. Global Food Security in a Changing Climate: Considerations and Projections

    Science.gov (United States)

    Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.

    2015-12-01

    Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.

  17. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  18. Management of Global Nuclear Materials for International Security

    International Nuclear Information System (INIS)

    Isaacs, T; Choi, J-S

    2003-01-01

    Nuclear materials were first used to end the World War II. They were produced and maintained during the cold war for global security reasons. In the succeeding 50 years since the Atoms for Peace Initiative, nuclear materials were produced and used in global civilian reactors and fuel cycles intended for peaceful purposes. The Nonproliferation Treaty (NPT) of 1970 established a framework for appropriate applications of both defense and civilian nuclear activities by nuclear weapons states and non-nuclear weapons states. As global inventories of nuclear materials continue to grow, in a diverse and dynamically changing manner, it is time to evaluate current and future trends and needed actions: what are the current circumstances, what has been done to date, what has worked and what hasn't? The aim is to identify mutually reinforcing programmatic directions, leading to global partnerships that measurably enhance international security. Essential elements are material protection, control and accountability (MPC and A) of separated nuclear materials, interim storage, and geologic repositories for all nuclear materials destined for final disposal. Cooperation among key partners, such as the MPC and A program between the U.S. and Russia for nuclear materials from dismantled weapons, is necessary for interim storage and final disposal of nuclear materials. Such cooperative partnerships can lead to a new nuclear regime where a complete fuel cycle service with fuel leasing and spent fuel take-back can be offered to reactor users. The service can effectively minimize or even eliminate the incentive or rationale for the user-countries to develop their indigenous enrichment and reprocessing technologies. International cooperation, supported by governments of key countries can be best to facilitate the forum for formation of such cooperative partnerships

  19. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  20. Hygiene and Industrial Security Program: General aspects

    International Nuclear Information System (INIS)

    1988-01-01

    This Venezuelan standard establishes the aspects that must be included in the elaboration and monitoring of an Hygiene and Industrial Security Program (Prevention of Accidents and Occupational Diseases Program). It is applicable to any type of exploitation company, or any kind of task (in nature or importance) where people work, no matter the number workers [es

  1. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  2. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    .... However, heightened awareness of terrorism has redefined supply-chain security-the consequences of an attack on or via a critical global port could be a tremendous loss of life and a crippling of the U.S...

  3. Global Food Security Support Analysis Data (GFSAD) Crop Mask 2010 Global 1 km V001

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Making Earth System Data Records for Use in Research Environments (MEaSUREs) Global Food Security Support Analysis Data (GFSAD) Crop Mask Global 1 kilometer...

  4. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  5. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  6. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  7. Neither International nor Global: Rethinking the Problematic Subject of Security

    Directory of Open Access Journals (Sweden)

    David Chandler

    2010-09-01

    Full Text Available This paper argues that the problematic of the international and the global has been a barrier to understanding the transformation of security discourse over the last decade. Academic treatments of security within the discipline of international relations have been structured by the traditional liberal binaries, which conceive of political communities capable of constituting securing subjects at either the level of the state or the global. Today’s dominant framing of the security problematic seems to evade easy articulation within this structure and in some readings is seen to presage a transitory stage from the international to the global. An alternative reading is sketched out here, that of the post- liberal, which suggests that the apparent shift towards the global can not be captured from within the liberal problematic and highlights that rather than traditional disagreements over the nature of the subject of security – the constitution of the securing actor – we are witnessing the disappearance of securing agency itself.

  8. Food Security: Selected Global and U.S. Resources

    Science.gov (United States)

    Kocher, Megan

    2015-01-01

    Food security is researched and dealt with on local, regional, national, and global levels with solutions ranging from local farmers' market initiatives to increasing crop yields through genetically modified plants to streamlining global supply chains. Because of its broad, interdisciplinary nature, it is necessary to narrow the focus of this…

  9. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  10. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  11. EU Contribution to Global CBRN Security

    OpenAIRE

    GOULART DE MEDEIROS MARGARIDA; ABOUSAHL SAID; MAIER EDDIE; SIMONART TRISTAN; DUPRE BRUNO

    2016-01-01

    The EU promotes a culture of CBRN safety and security within the EU and internationally. Accordingly, the Instrument Contributing to Stability and Peace (IcSP) contributes to international efforts to mitigate CBRN risks, whether of natural (e.g. pandemics, volcanic eruptions), accidental (Fukushima) or criminal (trafficking, terrorism) origin, following a consistent ‘all hazards’ approach. The aim is twofold: to prevent CBRN incidents and to build partner countries' capacities for emergency r...

  12. Explaining Global Secularity: Existential Security or Education?

    Directory of Open Access Journals (Sweden)

    Claude M. J. Braun

    2012-11-01

    Full Text Available At the time of data analysis for this report there were 193 countries in the world. Various institutions – the United Nations, the World Health Organization, the CIA, the World Values Survey, Gallup, and many others – have performed sophisticated statistical analyses on cross-national data. The present investigation demonstrates that valid and reliable data concerning religiosity and secularity exist for most countries and that these data are comparable. Cross-national data relating to social, political, economic and cultural aspects of life were tested for correlation with religiosity/secularity. In contrast to the most widely accepted general account of secularity, the Existential Security Framework (ESF; Norris & Inglehart, 2004, secularity was not most highly related to material security, though these were highly related. Rather, secularity was most strongly related to the degree of formal education attained. Material security explained no significant variance beyond education. Thus, religion’s primary function in the world today is being replaced, not so much by the pseudo-materialistic supplication for better living conditions as posited by the ESF, but by contemporary education – extensive knowledge of contemporary cultures, philosophy, modes of thought or processes of reasoning.

  13. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  14. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  15. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  16. THE MICROSOFT GLOBAL ORTHO PROGRAM

    Directory of Open Access Journals (Sweden)

    W. Walcher

    2012-07-01

    Full Text Available Wide area and thus continental mapping extending beyond national borders is a novel concept in civilian photogrammetry. The Microsoft Global Ortho Program was launched in the Spring of 2009 as a result of Microsoft's need for global geo-data at a high geometric resolution and radiometric excellence. By fall of 2012 more than 10 million km2 of the USA and 14 European countries will have been covered by seamless 30 cm GSD color-, 60 cm GSD false-color infrared ortho-mosaics and a 1 meter GSD digital surface model. The ortho-maps are being published to Microsoft's Bing Maps Internet mapping portal. The Global Ortho Program was designed for highly and unprecedented automated mapping of essentially entire continents. In 2011, exclusive of flight operations, the product output per person has been measured in excess of 275,000 square km per year. We describe research efforts that made this achievement possible. Those include a specially designed aerial sensor (Ultracam G, logistics simulation for fight planning and optimization, in-flight blur detection and subsequent automatic blur removal, modeling and removal of atmospheric and environmental conditions, automated shear detection and DTM refinement, an IT architecture to process >200,000 aerial images/day, and for creating over 1,000,000 km2 ortho-imagery and DSM data in 24 hours. While addressing these issues, we provide ideas how this might affect the future of spatial infrastructure initiatives.

  17. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  18. 7 CFR 772.7 - Leasing minor program loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of security...

  19. Deterrence and the New Global Security Environment - Lecture note

    International Nuclear Information System (INIS)

    Sitt, Bernard

    2006-01-01

    This lecture note makes an analysis of a collective publication entitled 'Deterrence and the New Global Security Environment', edited by Ian Kenyon and John Simpson (Routledge, New York, 2006). This collection of papers rigorously examines the current place of deterrence in international security relations, delivering the best of contemporary thinking. This is a special issue of the leading journal 'Contemporary Security Policy'. The present Lecture note emphasises a particular deterrence situation mentioned in this publication which is the one involving terrorist actors

  20. Global Climate Change: National Security Implications

    Science.gov (United States)

    2008-05-01

    it cost to treat asthma in children and other health problems caused by the dirt we were putting out of the smokestacks. It was passed by the...in Latin America for a number of years. General Clark used to say, “In SOUTHCOM, take no credit and expect none.” And I think that was a good rule...damage the health of our children .35 People also need to better understand the implications of globalization. Not all currently appreciate how our

  1. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  2. Fairtrade, Food Security and Globalization: Building Alternative Food Systems

    Directory of Open Access Journals (Sweden)

    Martin Calisto Friant

    2016-05-01

    Full Text Available This article examines the politics and practices of Fairtrade certification in order to assess whether this alternative trading system could contribute to innovative solutions for global food security. The analysis begins by assessing the main challenges and problems characterizing the contemporary global food system. It then explores the history, vision and certification standards of the Fairtrade label. In the third section, the results of the impact studies of Fairtrade certification on producer livelihoods are discussed, analyzing the various strengths and weaknesses. Finally the article analyzes whether, and how, the Fairtrade system could positively contribute to improving global food security. To conclude this paper argues that the greatest strength of Fairtrate is not the certification mechanism itself but rather the social and environmental principles it represents. Fairtrade standards could serve to inform broader international policies, which could lead to a sustainable transformation of the global food system.

  3. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  4. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  5. Just Security and the Crisis of Global Governance

    OpenAIRE

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade into others. Managing them so as to avoid such failures is an essential function of global governance. Public space is the home of governance (formal and informal) and of rights-exercising groups and ...

  6. The security analyzer, a security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.; Carlson, R.L.

    1987-01-01

    A technique has been developed to characterize a nuclear facility and measure the strengths and weaknesses of the physical protection system. It utilizes the artificial intelligence capabilities available in the prolog programming language to probe a facility's defenses and find potential attack paths that meet designated search criteria. As sensors or barriers become inactive due to maintenance, failure, or inclement weather conditions, the protection system can rapidly be reanalyzed to discover weaknesses that would need to be strengthened by alternative means. Conversely, proposed upgrades and enhancements can be easily entered into the database and their effect measured against a variety of potential adversary attacks. Thus the security analyzer is a tool that aids the protection planner as well as the protection operations staff

  7. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  8. Transforming Gender and Food Security in the Global South | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    29 sept. 2016 ... Jemimah Njuki is a senior program officer in the Agriculture and Food Security program at the International Development Research Centre (IDRC), based in Nairobi, Kenya. John R. Parkins is a professor in the Department of Resource Economics and Environmental Sociology, University of Alberta, Canada ...

  9. Epilogue: global food security, rhetoric, and the sustainable intensification debate

    NARCIS (Netherlands)

    Kuijper, T.W.M.; Struik, P.C.

    2014-01-01

    The need to feed nine billion people in 2050 has given rise to widespread debate in science and policy circles. The debate is largely framed in neo-Malthusian terms, and elements of global food security (resilience of the food system, food quantity and quality, right to and access to food) demand

  10. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  11. Just Security and the Crisis of Global Governance

    NARCIS (Netherlands)

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade

  12. Global energy security and the implications for the EU

    International Nuclear Information System (INIS)

    Umbach, Frank

    2010-01-01

    The following article will analyse the global and geopolitical dimensions of the future international energy security and its implications for Europe and the EU-27. In this context, I will discuss to which extent the EU's newly proclaimed 'Energy Action Plan' of the EU Spring summit of 2007 and its declared common energy (foreign) policy are a sufficient strategy to cope with the new global and geopolitical challenges. The article concludes the following: (1) The interlinkage between globally designed traditional energy security concepts - that rely just on economic factors and 'market-strategies' - and domestic as well as regional political stability demands new thinking with regard to both energy supply security and foreign and security policies. (2) Although after the Russian-Ukrainian gas conflict in January 2006, energy security has forced its way up the European energy and foreign policy agendas, the EU-27 member states have largely failed to forge a coherent European energy security and energy foreign policy strategy after their Spring summit of 2007 because its declared political solidarity has been still lacking. But the 2nd Strategic Energy Review of November 2008 has recommended new initiatives to overcome this lack by promoting concrete infrastructure and other projects for enhancing Europe's supply security and its political solidarity as part of a common energy (foreign) policy. If the EU is able to implement the March 2007 and November 2008 decisions, the EU oil and gas demand will drastically reduce and freeze at current levels. In this case, Putin's energy policies by using Russia's energy resources and pipeline monopolies as a political instrument to enforce its economic and geopolitical interests will be proved as self-defeating in Russia's long-term strategic interests. It will reduce Gazprom's gas exports to a much smaller EU gas market than originally forecasted as the result of a deliberate EU policy of decreasing its overall gas demand and

  13. Globally reasoning about localised security policies in distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax......, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access...... control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative...

  14. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  16. Global Food Security Governance: Civil Society Engagement in the Reformed Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.

    2015-01-01

    In 2007/8 world food prices spiked and global economic crisis set in, leaving hundreds of millions of people unable to access adequate food. The international reaction was swift. In a bid for leadership, the 123 member countries of the United Nations’ Committee on World Food Security (CFS) adopted a

  17. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  18. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  19. International conference on nuclear security: Global directions for the future. Contributed papers

    International Nuclear Information System (INIS)

    2005-01-01

    This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress

  20. International conference on nuclear security: Global directions for the future. Contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This volume includes contributed papers presented during sessions named as follows: Efforts to strengthen the global security framework, Efforts to strengthen nuclear security in Member states, role of the IAEA underpinning the global efforts, and looking forward: sustaining progress.

  1. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    International Nuclear Information System (INIS)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante

    2017-01-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  2. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante, E-mail: barreto@unifor.br, E-mail: midredcb@hotmail.com [Universidade de Fortaleza (UNIFOR), CE (Brazil)

    2017-07-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  3. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  4. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  5. Global health security and the International Health Regulations

    Directory of Open Access Journals (Sweden)

    Oliva Otavio

    2010-12-01

    Full Text Available Abstract Global nuclear proliferation, bioterrorism, and emerging infections have challenged national capacities to achieve and maintain global security. Over the last century, emerging infectious disease threats resulted in the development of the preliminary versions of the International Health Regulations (IHR of the World Health Organization (WHO. The current HR(2005 contain major differences compared to earlier versions, including: substantial shifts from containment at the border to containment at the source of the event; shifts from a rather small disease list (smallpox, plague, cholera, and yellow fever required to be reported, to all public health threats; and shifts from preset measures to tailored responses with more flexibility to deal with the local situations on the ground. The new IHR(2005 call for accountability. They also call for strengthened national capacity for surveillance and control; prevention, alert, and response to international public health emergencies beyond the traditional short list of required reporting; global partnership and collaboration; and human rights, obligations, accountability, and procedures of monitoring. Under these evolved regulations, as well as other measures, such as the Revolving Fund for vaccine procurement of the Pan American Health Organization (PAHO, global health security could be maintained in the response to urban yellow fever in Paraguay in 2008 and the influenza (H1N1 pandemic of 2009-2010.

  6. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  7. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  8. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  9. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  10. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  11. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  12. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  13. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  14. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  15. New realities: Disarmament, peace-building and global security

    International Nuclear Information System (INIS)

    1993-01-01

    This publication contains excerpts from the conference on new realities: Disarmament, peace-building and global security organized by the Non-Governmental Organization Committee on Disarmament at the United Nations, 20-23 April, 1993, during the regular session of the Disarmament Commission which took place in New York in April-May, 1993. This conference focused on important and topical disarmament and peacemaking issues, and was an opportunity for delegates, non-governmental organization representatives, United Nations staff members and interested individuals to exchange information and discuss the issues in an informal and cordial atmosphere

  16. GLOBAL DIMENSIONS OF ECOLOGICAL SECURITY IN DOMINANTA STRATEGIC PARTNERSHIP

    Directory of Open Access Journals (Sweden)

    А. Bokhan

    2014-06-01

    Full Text Available In the articles considered pressing questions of development of strategic partnership are taking into account priorities of ecological security that appears qualificatory and integrating for the countries of the world at the terms of display of calls and threats of globalization. The expediency of forming a joint environmental responsibility and market pragmatism in foreign policy of the countries of the world. Defined trends of strengthening ecological conflicts in the regions of the world because of the acute shortage of natural and energy resources, disproportions in distribution and irrational consumption. It is proved that the capacity for sustained leadership will be the countries who will testify capacity up to new forms of strategic partnership on the principles of ecological security, economic decisions considering interests and competitive aspirations for joint protection of the future of mankind. It is vitally necessary given the complexity of the influence of the parameters of the international system of ecological security in the economic, political and social transformation in society.

  17. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ...] Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice... Federal Register of August 20, 2013 (78 FR 51192). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was published with an incorrect email address for the SSCPP...

  18. Climate resilient crops for improving global food security and safety.

    Science.gov (United States)

    Dhankher, Om Parkash; Foyer, Christine H

    2018-05-01

    Food security and the protection of the environment are urgent issues for global society, particularly with the uncertainties of climate change. Changing climate is predicted to have a wide range of negative impacts on plant physiology metabolism, soil fertility and carbon sequestration, microbial activity and diversity that will limit plant growth and productivity, and ultimately food production. Ensuring global food security and food safety will require an intensive research effort across the food chain, starting with crop production and the nutritional quality of the food products. Much uncertainty remains concerning the resilience of plants, soils, and associated microbes to climate change. Intensive efforts are currently underway to improve crop yields with lower input requirements and enhance the sustainability of yield through improved biotic and abiotic stress tolerance traits. In addition, significant efforts are focused on gaining a better understanding of the root/soil interface and associated microbiomes, as well as enhancing soil properties. © 2018 The Authors Plant, Cell & Environment Published by John Wiley & Sons Ltd.

  19. Global Studies: Hurdles to Program Development

    Science.gov (United States)

    Campbell, Patricia J.; Masters, Paul E.; Goolsby, Amy

    2004-01-01

    In this article, we examine a new global studies program that departs from the traditional state-centric approach and uses a geocentric, or earth-centered, approach that emphasizes the roles of individuals, grassroots organizations, cultural groups, and international organizations in an attempt to help students conceptualize global events and…

  20. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  1. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  2. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  3. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  4. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  5. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  6. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  7. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  8. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  9. APPROACHES TO GLOBAL SECURITY. ACTORS, MANIFESTATIONS AND TENDENCIES

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2013-01-01

    Full Text Available Nowadays, the world seems to be in a transition from the current system founded on the liberal social, economic and political model to a more diverse and heterogeneous model in which the determinant role is played by a number of state and non-state actors. The step from the Western system of cultural, political and predominant economic values to a more diverse and heterogeneous system makes the actors involved defend not only their visions, but also promote their own interests. The differences between visions gain relevance and clarity because the countries supporting them obtain increased power, and that is more than obvious. All this leads to a symmetric allocation of different means, which generates uncertainties and diminishes unilateral actions This transition process impacts global security especially through the asymmetric, unconventional and hybrid risks and threats manifesting worldwide.

  10. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  11. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  12. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  13. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  14. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  15. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  16. Arsenic contamination in food chain: Thread to global food security

    Science.gov (United States)

    Kashyap, C. A.

    2016-12-01

    The supply of good quality food is a necessity for economic and social health of urban and rural population. Over the last several decades groundwater contamination in developing countries has assumed dangerous levels as a result millions of people are at risk. This is so particularly with respect to arsenic that has registered high concentration in groundwater in countries like India and Bangladesh. The arsenic content in groundwater varies from 10 to 780 µg/L, which is far above the levels for drinking water standards prescribed by World Health Organization (WHO). Currently arsenic has entered in food chain due to irrigation with arsenic contaminated water. In the present study reports the arsenic contamination in groundwater that is being used for irrigating paddy in Manipur and West Bengal. The arsenic content in irrigation water is 475 µg/L and 780 µg/L in Manipur and West Bengal, respectively. In order to assess the effect of such waters on the rice crop, we collected rice plant from Manipur and determined the arsenic content in roots, stem, and grain. The arsenic content in grain varies from 110 to 190 mg/kg while the limit of arsenic intake by humans is 10 mg/kg (WHO). This problem is not confine to the area, it spread global level, and rice being cultivated in these regions is export to the other countries like USA, Middle East and Europe and will be thread to global food security.

  17. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    Keywords: static security, gene expression programming, probabilistic neural network ... Hence digital computers are usually installed in operations control centers to gather ...... power system protection, and applications of AI in power systems.

  18. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  19. Exploring the impact of the 2008 global food crisis on food security among vulnerable households in rural South Africa.

    Science.gov (United States)

    Nawrotzki, Raphael J; Robson, Kristin; Gutilla, Margaret J; Hunter, Lori M; Twine, Wayne; Norlund, Petra

    2014-04-01

    Recurring food crises endanger the livelihoods of millions of households in developing countries around the globe. Owing to the importance of this issue, we explore recent changes in food security between the years 2004 and 2010 in a rural district in Northeastern South Africa. Our study window spans the time of the 2008 global food crises and allows the investigation of its impacts on rural South African populations. Grounded in the sustainable livelihood framework, we examine differences in food security trajectories among vulnerable sub populations. A unique panel data set of 8,147 households, provided by the Agincourt Health and Demographic Surveillance System (Agincourt HDSS), allows us to employ a longitudinal multilevel modeling approach to estimate adjusted growth curves for the differential change in food security across time. We observe an overall improvement in food security that leveled off after 2008, most likely resulting from the global food crisis. In addition, we discover significant differences in food security trajectories for various sub populations. For example, female-headed households and those living in areas with better access to natural resources differentially improved their food security situation, compared to male-headed households and those households with lower levels of natural resource access. However, former Mozambican refugees witnessed a decline in food security. Therefore, poverty alleviation programs for the Agincourt region should work to improve the food security of vulnerable households, such as former Mozambican refugees.

  20. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  1. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  2. ICT security curriculum or how to respond to current global challenges

    Directory of Open Access Journals (Sweden)

    Marian Silviu Poboroniuc

    2017-01-01

    Full Text Available The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions. The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and Information Engineering (EIE education within Europe, especially in relation to modern global technical challenges and to provide higher education models in a few EIE fields in accordance with these challenges. One of the outcomes of the project was a new ICT (Information and Computer Technology Security curriculum for bachelor and master levels. The research methodology comprised such stages as: identifying the most important current global challenges, conducting a survey related to existing EIE programs in order to establish the top-level criteria for an EIE curriculum, analyzing the results of the survey, obtaining the industry feedback related to technical and non-technical skills required for the specific field, and proposing a new curriculum for ICT Security programmes to respond to the modern technical challenges and to meet the needs of the industry, students, academics and graduates. As future work we will focus on stakeholder assessment in the EIE field and, based on the resulting feedback, on improving the ICT Security curriculum.

  3. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  4. Incorporating Global Information Security and Assurance in I.S. Education

    Science.gov (United States)

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  5. Strengthening global health security capacity--Vietnam demonstration project, 2013.

    Science.gov (United States)

    Tran, Phu Dac; Vu, Long Ngoc; Nguyen, Hien Tran; Phan, Lan Trong; Lowe, Wayne; McConnell, Michelle S; Iademarco, Michael F; Partridge, Jeffrey M; Kile, James C; Do, Trang; Nadol, Patrick J; Bui, Hien; Vu, Diep; Bond, Kyle; Nelson, David B; Anderson, Lauren; Hunt, Kenneth V; Smith, Nicole; Giannone, Paul; Klena, John; Beauvais, Denise; Becknell, Kristi; Tappero, Jordan W; Dowell, Scott F; Rzeszotarski, Peter; Chu, May; Kinkade, Carl

    2014-01-31

    Over the past decade, Vietnam has successfully responded to global health security (GHS) challenges, including domestic elimination of severe acute respiratory syndrome (SARS) and rapid public health responses to human infections with influenza A(H5N1) virus. However, new threats such as Middle East respiratory syndrome coronavirus (MERS-CoV) and influenza A(H7N9) present continued challenges, reinforcing the need to improve the global capacity to prevent, detect, and respond to public health threats. In June 2012, Vietnam, along with many other nations, obtained a 2-year extension for meeting core surveillance and response requirements of the 2005 International Health Regulations (IHR). During March-September 2013, CDC and the Vietnamese Ministry of Health (MoH) collaborated on a GHS demonstration project to improve public health emergency detection and response capacity. The project aimed to demonstrate, in a short period, that enhancements to Vietnam's health system in surveillance and early detection of and response to diseases and outbreaks could contribute to meeting the IHR core capacities, consistent with the Asia Pacific Strategy for Emerging Diseases. Work focused on enhancements to three interrelated priority areas and included achievements in 1) establishing an emergency operations center (EOC) at the General Department of Preventive Medicine with training of personnel for public health emergency management; 2) improving the nationwide laboratory system, including enhanced testing capability for several priority pathogens (i.e., those in Vietnam most likely to contribute to public health emergencies of international concern); and 3) creating an emergency response information systems platform, including a demonstration of real-time reporting capability. Lessons learned included awareness that integrated functions within the health system for GHS require careful planning, stakeholder buy-in, and intradepartmental and interdepartmental coordination and

  6. The First International Conference on Global Food Security – A Synthesis

    NARCIS (Netherlands)

    Ittersum, van M.K.; Giller, K.E.

    2014-01-01

    Improving food security is difficult. There are many reasons why hunger and malnutrition persist, not least because deep social inequities and conflicts often dominate. Equally many approaches are needed to deal with this global problem. In the case of global food security, improvements can depend

  7. The Globalization of Higher Education as a Societal and Cultural Security Problem

    Science.gov (United States)

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  8. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  9. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  10. PERSPECTIVE: Climate change, biofuels, and global food security

    Science.gov (United States)

    Cassman, Kenneth G.

    2007-03-01

    There is a new urgency to improve the accuracy of predicting climate change impact on crop yields because the balance between food supply and demand is shifting abruptly from surplus to deficit. This reversal is being driven by a rapid rise in petroleum prices and, in response, a massive global expansion of biofuel production from maize, oilseed, and sugar crops. Soon the price of these commodities will be determined by their value as feedstock for biofuel rather than their importance as human food or livestock feed [1]. The expectation that petroleum prices will remain high and supportive government policies in several major crop producing countries are providing strong momentum for continued expansion of biofuel production capacity and the associated pressures on global food supply. Farmers in countries that account for a majority of the world's biofuel crop production will enjoy the promise of markedly higher commodity prices and incomesNote1. In contrast, urban and rural poor in food-importing countries will pay much higher prices for basic food staples and there will be less grain available for humanitarian aid. For example, the developing countries of Africa import about 10 MMt of maize each year; another 3 5 MMt of cereal grains are provided as humanitarian aid (figure 1). In a world where more than 800 million are already undernourished and the demand for crop commodities may soon exceed supply, alleviating hunger will no longer be solely a matter of poverty alleviation and more equitable food distribution, which has been the situation for the past thirty years. Instead, food security will also depend on accelerating the rate of gain in crop yields and food production capacity at both local and global scales. Maize imports and cereal donations as humanitarian aid to the developing countries of Africa Figure 1. Maize imports (yellow bar) and cereal donations as humanitarian aid to the developing countries of Africa, 2001 2003. MMT = million metric tons. Data

  11. Global Food Security Index Studies and Satellite Information

    Science.gov (United States)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  12. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  13. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Helen H [Los Alamos National Laboratory

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  14. Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.

    Science.gov (United States)

    Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H

    2018-04-29

    The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.

  15. English Curriculum in Global Engineer Education Program

    Science.gov (United States)

    Furuya, Okitsugu; Bright, Olga; Saika, Takashi

    The educational goal of the Faculty of Global Engineering (FGE) of the Kogakuin University is to prepare the graduates to be global engineers. The requirements for the global engineer are multifold; having the basic and advanced engineering knowledge together with the international communication skills and experiences. The curriculum at the Kogakuin University has been designed and developed over the last ten years. Among others, “Communication Skills for Global Engineers (CSGE) ” and “Engineering Clinic Program (ECP) ” play essential roles, the former providing the students with the communication skills and the latter engineering design skills. An impact on the students studying together with foreign students is so strong and immeasurable. The English they learned in Japan does not work as well as they thought it would, and the attitude of the foreign students toward studying they observe is a kind of “shocking” . The student who joined ECP abroad/CSGE abroad come back to Japan as a very inspired and different person, the first step becoming a global engineer. In this paper, various aspects of the program will be discussed with the problem areas to be further improved being identified.

  16. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  17. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  18. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  19. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  20. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  1. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  2. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  3. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  4. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  5. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... on secret values and results are only revealed according to specific protocols. We identify the key linguistic concepts of SMC and bridge the gap between high-level security requirements and low-level cryptographic operations constituting an SMC platform, thus improving the efficiency and security of SMC...

  6. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  7. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  8. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  9. Towards a global terrestrial species monitoring program

    Science.gov (United States)

    Schmeller, Dirk S.; Julliard, Romain; Bellingham, Peter J.; Böhm, Monika; Brummitt, Neil; Chiarucci, Alessandro; Couvet, Denis; Elmendorf, Sarah; Forsyth, David M.; Moreno, Jaime García; Gregory, Richard D.; Magnusson, William E.; Martin, Laura J.; McGeoch, Melodie A.; Mihoub, Jean-Baptiste; Pereira, Henrique M.; Proença, Vânia; van Swaay, Chris A.M.; Yahara, Tetsukazu; Belnap, Jayne

    2015-01-01

    Introduction: The Convention for Biological Diversity’s (CBD) Strategic Plan for Biodiversity 2011-2020 envisions that “By 2050, biodiversity is valued, conserved, restored and wisely used, maintaining ecosystem services, sustaining a healthy planet and delivering benefits essential for all people.” Although 193 parties have adopted these goals, there is little infrastructure in place to monitor global biodiversity trends. Recent international conservation policy requires such data to be up-to-date, reliable, comparable among sites, relevant, and understandable; as is becoming obvious from the work plan adopted by the Intergovernmental Panel for Biodiversity and Ecosystem Services (IPBES: www.ipbes.net/; http://tinyurl.com/ohdnknq). In order to meet the five strategic goals of the Strategic Plan for Biodiversity 2011-2020 and its 20 accompanying Aichi Targets for 2020 (www.cbd.int/sp/targets/), advances need to be made in coordinating large-scale biodiversity monitoring and linking these with environmental data to develop a comprehensive Global Observation Network, as is the main idea behind GEOSS the Global Earth Observation System of Systems (Christian 2005)...Here we identify ten requirements important for the successful implementation of a global biodiversity monitoring network under the flag of GEO BON and especially a global terrestrial species monitoring program.

  10. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  11. China's mineral resources security under economic globalization

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y. [China University of Mining and Technology, Xuzhou (China). College of Environment and Spatial Informatics

    2002-10-01

    The concept and intention of mineral resources security are introduced. From the insurance and leverage that mineral resources has on China's socio-economic development, the strength of support, the opportunity and challenge imposed by globalised economy, the effect of mineral resource development on the safety of the eco-environment, the author analyses the basic situation and existing problem of the mineral resources security in China; summarizes the current research situation of mineral resources security and the main tactics which are used to ensure mineral resources security in the developed countries; presents the essence of mineral resources security, the basic principles of research and the problems focused; and points out the research areas and goals that should be strengthened urgently. 15 refs.

  12. Language Issues in Mobile Program Security

    Science.gov (United States)

    1998-01-01

    primitives for instance synchronous operations Nondeterminism and Privacy Now suppose we introduce nondeterminism via a simple concurrent language...code setting is that the only observable events are those that can be observed from within a mobile program using language primitives and any host...Possibilistic NI is given in It uses a main thread and two triggered threads each with a busy wait loop implementing a semaphore to copy every bit of

  13. Environmental and radiological remediation under Canada's global partnership program 2004-11 - 59185

    International Nuclear Information System (INIS)

    Washer, Michael J.

    2012-01-01

    Following the '911' attack on the USA in 2001 the international community under Canada's G8 leadership established a $20 billion Global Partnership initiative in 2002 to collaboratively address threats to global security posed by the proliferation and potential terrorist use of Weapons and Materials of Mass Destruction (WMMD) and related materials and knowledge. This major international initiative addressed four priority areas: (1) Chemical Weapon Destruction (2) Nuclear powered submarine eliminations (3) Nuclear and radiological security; and (4) Employment for former weapon scientists. Additionally the initiative has addressed Biological Non- Proliferation. Canada's execution of all these program areas has resulted in substantial environmental benefits aside from the eradication and securing of WMMD. This paper reviews the environmental and radiological remediation achievements of the four primary Global Partnership program areas addressed under Canadian funding 2004 through 2011. (author)

  14. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  15. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  16. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  17. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  18. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  19. Transforming Gender and Food Security in the Global South | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-09-29

    Sep 29, 2016 ... It investigates how food security and gender inequity are conceptualized within ... underlying social, cultural, and economic causes of gender inequality. Taken together, these combined approaches enable women and men to ...

  20. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  1. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  3. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  4. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  5. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  6. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  7. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  8. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    National Research Council Canada - National Science Library

    Hubenko, Jr, Victor P

    2008-01-01

    With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration...

  9. Global food and fibre security threatened by current inefficiencies in fungal identification

    NARCIS (Netherlands)

    Crous, Pedro W.; Groenewald, Johannes Z.; Slippers, Bernard; Wingfield, Michael J.

    2016-01-01

    Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity,

  10. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  11. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  12. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  13. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  14. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  15. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  16. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  17. Global Survey of the Concepts and Understanding of the Interfaces Between Nuclear Safety, Security, and Safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Kovacic, Don N.; Stewart, Scott; Erickson, Alexa R.; Ford, Kerrie D.; Mladineo, Stephen V.

    2015-07-15

    There is increasing global discourse on how the elements of nuclear safety, security, and safeguards can be most effectively implemented in nuclear power programs. While each element is separate and unique, they must nevertheless all be addressed in a country’s laws and implemented via regulations and in facility operations. This topic is of particular interest to countries that are currently developing the infrastructure to support nuclear power programs. These countries want to better understand what is required by these elements and how they can manage the interfaces between them and take advantages of any synergies that may exist. They need practical examples and guidance in this area in order to develop better organizational strategies and technical capacities. This could simplify their legal, regulatory, and management structures and avoid inefficient approaches and costly mistakes that may not be apparent to them at this early stage of development. From the perspective of IAEA International Safeguards, supporting Member States in exploring such interfaces and synergies provides a benefit to them because it acknowledges that domestic safeguards in a country do not exist in a vacuum. Instead, it relies on a strong State System of Accounting and Control that is in turn dependent on a capable and independent regulatory body as well as a competent operator and technical staff. These organizations must account for and control nuclear material, communicate effectively, and manage and transmit complete and correct information to the IAEA in a timely manner. This, while in most cases also being responsible for the safety and security of their facilities. Seeking efficiencies in this process benefits international safeguards and nonproliferation. This paper will present the results of a global survey of current and anticipated approaches and practices by countries and organizations with current or future nuclear power programs on how they are implementing, or

  18. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  19. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  20. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  1. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  2. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  3. Global Food Security Problems in the Modern World Economy

    Science.gov (United States)

    Abdulkadyrova, Madina A.; Dikinov, Andzor H.; Tajmashanov, Hassan È.; Shidaev, Lomali A.; Shidaeva, Eliza A.

    2016-01-01

    Importance: Food problem at the present stage of development of mankind is that due to improper and overly intensive use of natural resources, increasing demand for livestock products, increasing per capita food consumption and other factors, there has been a steady rise in food prices, represents a threat to food security in the countries with…

  4. Global change, urban livelihoods and food security; presentation

    CSIR Research Space (South Africa)

    Murambadoro, M

    2012-02-01

    Full Text Available Food security research and policy have focused more on the rural poor where the incidence and depth of poverty is more pronounced. Urban livelihoods are based on cash income and many people in urban areas are employed in the informal sector which...

  5. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  6. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  7. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    The global supply chain is the network of suppliers, manufacturing centers, warehouses, distribution centers, and retail outlets that transforms raw materials into finished products and delivers them to consumers...

  8. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    Science.gov (United States)

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  9. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  10. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  11. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  12. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  13. The Glory Program: Global Science from a Unique Spacecraft Integration

    Science.gov (United States)

    Bajpayee Jaya; Durham, Darcie; Ichkawich, Thomas

    2006-01-01

    The Glory program is an Earth and Solar science mission designed to broaden science community knowledge of the environment. The causes and effects of global warming have become a concern in recent years and Glory aims to contribute to the knowledge base of the science community. Glory is designed for two functions: one is solar viewing to monitor the total solar irradiance and the other is observing the Earth s atmosphere for aerosol composition. The former is done with an active cavity radiometer, while the latter is accomplished with an aerosol polarimeter sensor to discern atmospheric particles. The Glory program is managed by NASA Goddard Space Flight Center (GSFC) with Orbital Sciences in Dulles, VA as the prime contractor for the spacecraft bus, mission operations, and ground system. This paper will describe some of the more unique features of the Glory program including the integration and testing of the satellite and instruments as well as the science data processing. The spacecraft integration and test approach requires extensive analysis and additional planning to ensure existing components are successfully functioning with the new Glory components. The science mission data analysis requires development of mission unique processing systems and algorithms. Science data analysis and distribution will utilize our national assets at the Goddard Institute for Space Studies (GISS) and the University of Colorado's Laboratory for Atmospheric and Space Physics (LASP). The Satellite was originally designed and built for the Vegetation Canopy Lidar (VCL) mission, which was terminated in the middle of integration and testing due to payload development issues. The bus was then placed in secure storage in 2001 and removed from an environmentally controlled container in late 2003 to be refurbished to meet the Glory program requirements. Functional testing of all the components was done as a system at the start of the program, very different from a traditional program

  14. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  15. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  16. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  17. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  18. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  19. U.S. Global Change Research Program National Climate Assessment Global Change Information System

    Science.gov (United States)

    Tilmes, Curt

    2012-01-01

    The program: a) Coordinates Federal research to better understand and prepare the nation for global change. b) Priori4zes and supports cutting edge scientific work in global change. c) Assesses the state of scientific knowledge and the Nation s readiness to respond to global change. d) Communicates research findings to inform, educate, and engage the global community.

  20. Bioseguridad in Mexico: Pursuing Security between Local and Global Biologies.

    Science.gov (United States)

    Wanderer, Emily Mannix

    2017-09-01

    In the aftermath of the 2009 outbreak of H1N1 influenza, scientists in Mexico sought to develop bioseguridad, that is, to protect biological life in Mexico by safely conducting research on infectious disease. Drawing on ethnographic research in laboratories and with scientists in Mexico, I look at how scientists make claims about local differences in regulations, infrastructure, bodies, and culture. The scientists working with infectious microbes sought to establish how different microbial ecologies, human immune systems, and political and regulatory systems made the risks of research different in Mexico from other countries. In developing bioseguridad, the idea of globalized biology that animates many public health projects was undermined as scientists attended to the elements of place that affected human health and safety. Scientists argued for the importance of local biologies, generating tension with global public health projects and regulations premised on the universality of biology. © 2016 by the American Anthropological Association.

  1. Guidelines and recommendations for regional approaches to disarmament within the context of global security

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Guidelines and recommendations for regional approaches to disarmament within the context of global security provide both a conceptual framework within which to pursue arms control in South Asia and a variety of concrete mechanisms or tools to carry out the task. However, they cannot operate independently of a broader process of political accommodation, which might be named as 'cooperative security building'. That process, however embryonic, is under way across Asia Pacific region

  2. Security auditing: a prescription for keeping protection programs healthy.

    Science.gov (United States)

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  3. Financial security of the state in terms of globalization processes escalation

    Directory of Open Access Journals (Sweden)

    Svitlana Tkalenko

    2013-02-01

    Full Text Available The article provides review of the globalization and global integration processes impact on the financial sector formation characterized by an increase in financial flows with the lead role played by transnational corporations and transnational banks. The globalization study has been already reflected by numerous scientific publications and various issues of reputable international academic journals describing the process as irreversible and objective along with demonstrating globalization merits and demerits, etc. In the 21st century, globalization is an issue discussed by everyone: ranging from presidents, prime ministers and members of parliament supposed to solve problems of any scale taking into consideration the global development phenomenon, to ordinary citizens. Today, globalization has obviously become a major trend of the modern world development, which is why issues implying sound development assurance become pressing for each country. The article dwells upon the main component of economic security — the financial one (Ukraine case study. Thus, we are engaged in studying the global development trend in terms of assuring security of the state under conditions of financial flows globalization and existence of global integration processes.

  4. Globalizing Social Justice Education: The Case of The Global Solidarity Network Study e-Broad Program

    Science.gov (United States)

    Harrison, Yvonne D.; Kostic, Kevin; Toton, Suzanne C.; Zurek, Jerome

    2010-01-01

    This paper documents the development, implementation, and evaluation of "The Global Solidarity Network Study e-Broad Program (GSNSeBP)", an online social justice educational program that is blended into an onsite academic course. This global electronic program, which was developed through a partnership between Catholic Relief Services (CRS) and…

  5. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  6. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  7. An Overview of Global Nuclear Security Regime and Its Introduction into the Nigerian Educational System

    International Nuclear Information System (INIS)

    Jonah, S.A.

    2013-01-01

    Nuclear security is the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the respective country. Within a State the nuclear security regime resembles layers of an onion with equipment and personnel securing the borders and ports representing the outer layer. Nuclear power, research reactor and nuclear medicine facilities constitute the various inner layers down to the actual target materials. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, hardware and software. Nigeria is a non-nuclear weapons state and without a large-scale nuclear industry, but have a major role to play in preventing nuclear terrorism globally. It is pertinent to know that as the Fukushima accident and other nuclear accidents have demonstrated, nuclear crises do not respect borders. Therefore, nuclear threats must be addressed by all nations. Furthermore, to set the groundwork for the safe, peaceful and stable use of nuclear energy in Nigeria and all over the world, efforts must be made to enhance nuclear safety and security. This paper discusses the present international nuclear security regime and possibility of integrating it into the Nigerian educational system in view of current global perspectives and nuclear renaissance.

  8. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  9. Russian spent marine fuel as a global security risk

    International Nuclear Information System (INIS)

    Gussgard, K.; Reistad, O.

    2001-01-01

    Russian marine fuel is a trans-national security concern. This paper focuses on specific technical properties of Russian marine nuclear fuel especially relevant for evaluating different aspects on nuclear proliferation, in addition to risks associated with regional environmental degradation and illegal diversion of radiological substances. Russian fresh fuel for marine reactors has been involved in several significant cases of illicit trafficking of special nuclear materials. The amount and quality of nuclear materials in Russian spent marine fuel give also reason for concern. Not less than 200 marine reactor cores are ready for having their spent fuel unloaded and preliminary stored on shore in the Far East and North West of Russia, and large amounts of spent naval fuel have been stored at Russian military bases for decades. In order to assess the security risks associated with Russian spent marine fuel, this paper discusses the material attractiveness of spent fuel from all types of Russian marine reactors. The calculations are based on a model of a light water moderated Russian icebreaker reactor. The computer tool HELIOS, used for modelling the reactor and the reactor operations, has been extensively qualified by comparisons with experimental data and international benchmark problems for reactor physics codes as well as through feedback from applications. Some of these benchmarks and studies include fuel enrichments up to 90% in Russian marine reactors. Several fuel data cases are discussed in the paper, focusing especially on: 1) early fuel designs with low initial enrichment; 2) more modern fuel designs used in third and fourth generation of Russian submarines probably with intermediate enriched fuel; and 3) marine fuel with initial enrichment levels close to weapons-grade material. In each case the fuel has been burned until k eff has reached below 1. Case 1) has been evaluated, the calculations made as basis for this paper have concentrated on fuel with

  10. G8 Global Partnership: Germany's contribution to strengthening international security

    International Nuclear Information System (INIS)

    Pfaffernoschke, A.

    2013-01-01

    This series of slides presents the German contribution to the G8 Global partnership whose aim is to support specific cooperation projects to address non-proliferation, disarmament, counter-terrorism and nuclear safety issues. 4 priorities have been identified: -) destruction of chemical weapons, -) dismantlement of decommissioned nuclear submarines, -) disposition of fissile materials, and -) employment of former weapon scientists. Today there are 23 donor countries and 2 official recipient countries (Russian Federation and Ukraine). Since the beginning Germany's activities in the G8 Global partnership have focused on chemical weapon destruction (340 million euros), dismantlement of nuclear submarines (600 million euros) and physical protection of nuclear materials (170 million euros). In the Gorny project (1995-2005) German provided the incinerator for the thermal treatment of liquid and solid residues and the equipment for destruction by hydrolysis. Germany's contribution to the following projects: -) the Kambarka project (2003-2007) for the destruction of lewisite, -) the Pochep project (2007-2010) for the destruction of munition containing nerve agents, and -) the Sajda-Bay project for the construction of a long-term storage site for reactor sections of decommissioned submarines, are detailed

  11. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  12. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John

    2015-01-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  13. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.

    2015-12-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  14. WMD Proliferation, Globalization, and International Security: Whither the Nexus and National Security?

    Science.gov (United States)

    2006-07-01

    group Aum Shinrikyo on the Tokyo subway system, which resulted in 10 deaths, is regarded by many as the dawn of the era of modern WMD terrorism...organizations have become truly global in character. Al Qaeda, for example, is franchising operations around the world either directly or indirectly

  15. The evolution, etiology and eventualities of the global health security regime.

    Science.gov (United States)

    Hoffman, Steven J

    2010-11-01

    Attention to global health security governance is more important now than ever before. Scientists predict that a possible influenza pandemic could affect 1.5 billion people, cause up to 150 million deaths and leave US$3 trillion in economic damages. A public health emergency in one country is now only hours away from affecting many others. Using regime analysis from political science, the principles, norms, rules and decision-making procedures by which states govern health security are examined in the historical context of their punctuated evolution. This methodology illuminates the catalytic agents of change, distributional consequences and possible future orders that can help to better inform progress in this area. Four periods of global health security governance are identified. The first is characterized by unilateral quarantine regulations (1377-1851), the second by multiple sanitary conferences (1851-92), the third by several international sanitary conventions and international health organizations (1892-1946) and the fourth by the hegemonic leadership of the World Health Organization (1946-????). This final regime, like others before it, is challenged by globalization (e.g. limitations of the new International Health Regulations), changing diplomacy (e.g. proliferation of global health security organizations), new tools (e.g. global health law, human rights and health diplomacy) and shock-activated vulnerabilities (e.g. bioterrorism and avian/swine influenza). This understanding, in turn, allows us to appreciate the impact of this evolving regime on class, race and gender, as well as to consider four possible future configurations of power, including greater authority for the World Health Organization, a concert of powers, developing countries and civil society organizations. This regime analysis allows us to understand the evolution, etiology and eventualities of the global health security regime, which is essential for national and international health

  16. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  17. Food security for Africa: an urgent global challenge

    Directory of Open Access Journals (Sweden)

    Sasson Albert

    2012-04-01

    Full Text Available Abstract In 2012, food insecurity is still a major global concern as 1 billion people are suffering from starvation, under-, and malnutrition, and the Food and Agriculture Organization of the United Nations (FAO has concluded that we are still far from reaching millennium development goal (MDG number 1: to halve extreme poverty and hunger by 2015. In sub-Saharan Africa, the number of people suffering from hunger is estimated at 239 million, and this figure could increase in the near future. There are many examples of food insecurity in sub-Saharan Africa, some of them having reached catastrophic dimensions, for example, in the Horn of Africa or southern Madagascar. Food insecurity is not just about insufficient food production, availability, and intake, it is also about the poor quality or nutritional value of the food. The detrimental situation of women and children is particularly serious, as well as the situation among female teenagers, who receive less food than their male counterparts in the same households. Soaring food prices and food riots are among the many symptoms of the prevailing food crisis and insecurity. Climate change and weather vagaries, present and forecast, are generally compounding food insecurity and drastically changing farming activities, as diagnosed by the Consultative Group on International Agricultural Research (CGIAR in June 2011. The key cause of food insecurity is inadequate food production. Since the global food crisis of 2007–2008, there has been an increasing awareness throughout the world that we must produce more and better food; and we should not be derailed from this goal, despite some relief brought by the good cereal harvests in 2011–2012. This is particularly true in sub-Saharan Africa, which needs and wants to make its own green revolution. The African challenge indeed is key to mitigating food insecurity in the world. Commitments were made by the heads of states and governments of the African Union

  18. Satellite Imagery Analysis for Automated Global Food Security Forecasting

    Science.gov (United States)

    Moody, D.; Brumby, S. P.; Chartrand, R.; Keisler, R.; Mathis, M.; Beneke, C. M.; Nicholaeff, D.; Skillman, S.; Warren, M. S.; Poehnelt, J.

    2017-12-01

    The recent computing performance revolution has driven improvements in sensor, communication, and storage technology. Multi-decadal remote sensing datasets at the petabyte scale are now available in commercial clouds, with new satellite constellations generating petabytes/year of daily high-resolution global coverage imagery. Cloud computing and storage, combined with recent advances in machine learning, are enabling understanding of the world at a scale and at a level of detail never before feasible. We present results from an ongoing effort to develop satellite imagery analysis tools that aggregate temporal, spatial, and spectral information and that can scale with the high-rate and dimensionality of imagery being collected. We focus on the problem of monitoring food crop productivity across the Middle East and North Africa, and show how an analysis-ready, multi-sensor data platform enables quick prototyping of satellite imagery analysis algorithms, from land use/land cover classification and natural resource mapping, to yearly and monthly vegetative health change trends at the structural field level.

  19. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  20. Increasing homogeneity in global food supplies and the implications for food security

    NARCIS (Netherlands)

    Khoury, C.K.; Bjorkman, A.D.; Dempewolf, H.; Ramirez-Villegas, J.; Guarino, L.; Jarvis, A.; Rieseberg, L.H.; Struik, P.C.

    2014-01-01

    The narrowing of diversity in crop species contributing to the world’s food supplies has been considered a potential threat to food security. However, changes in this diversity have not been quantified globally. We assess trends over the past 50 y in the richness, abundance, and composition of crop

  1. Global Energy Security and Its Geopolitical Impediments: The Case of the Caspian Region

    NARCIS (Netherlands)

    Amineh, M.P.; Houweling, H.

    2007-01-01

    This article discusses the global geopolitics of energy security in the post-Cold War environment. Energy companies headquartered in western countries have long history of accessing energy resources beyond borders through invasion of the host by their home state, followed by domination and the

  2. Transnational legal assemblages and global security law: topologies and temporalities of the list

    NARCIS (Netherlands)

    Sullivan, G.

    2014-01-01

    This article examines the UN 1267 Al-Qaida sanctions regime as a technique of global security listing and form of transnational law with distinct legal ordering processes. Conventional literatures frame these sanctions in formalist terms, flattening their complexity. Understanding their qualities

  3. Global Production: The Case of Offshore Programming

    DEFF Research Database (Denmark)

    Nørbjerg, Jacob; Havn, Erling; Bansler, Jørgen P.

    1997-01-01

    of software is no exception.In this paper, we present a newly started research project on offshore program-ming, that is the practice of sending software development “offshore,” to India or other low wage areas. The project focuses on the organisation of offshore program-ming and, particularly, on the role...

  4. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  5. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  6. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  7. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  8. US Centers for Disease Control and Prevention and Its Partners' Contributions to Global Health Security.

    Science.gov (United States)

    Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca

    2017-12-01

    To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.

  9. Global citizenship is key to securing global health: the role of higher education.

    Science.gov (United States)

    Stoner, Lee; Perry, Lane; Wadsworth, Daniel; Stoner, Krystina R; Tarrant, Michael A

    2014-07-01

    Despite growing public awareness, health systems are struggling under the escalating burden of non-communicable diseases. While personal responsibility is crucial, alone it is insufficient. We argue that one must place themselves within the broader/global context to begin to truly understand the health implications of personal choices. Global citizenship competency has become an integral part of the higher education discourse; this discourse can and should be extended to include global health. A global citizen is someone who is (1) aware of global issues, (2) socially responsible, and (3) civically engaged. From this perspective, personal health is not solely an individual, self-serving act; rather, the consequences of our lifestyle choices and behaviors have far-reaching implications. This paper will argue that, through consciously identifying global health within the constructs of global citizenship, institutions of higher education can play an instrumental role in fostering civically engaged students capable of driving social change. Copyright © 2014 Elsevier Inc. All rights reserved.

  10. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  11. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  12. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  13. The Influence of Globalization on the Change and Convergence of Social Security Transfer: An Empirical Analysis for OECD Counties

    Directory of Open Access Journals (Sweden)

    Jinyoung Hwang

    2007-12-01

    Full Text Available Using a cross-section of OECD countries, this paper examines the relationship between globalization and the change and convergence of social security transfer. Globalization has arguably had a profound impact on the use of social protection in states, since it is normally accompanied with increases in income inequality, polarization, and unemployment. In addition, globalization may lead to socio- economic policy harmonization across countries. The empirical results show that there exists a significant and positive relationship between social security transfer in GDP and the globalization index based on political, economic, and social integrations. Also, we found the convergence phenomenon of social security transfer in OECD countries, applying the traditional methodology of convergence and convergence. Therefore, there is evidence in OECD countries that globalization indirectly affects the convergence of social security transfer in addition to direct relation to social security transfer in GDP.

  14. Water dependency and water exploitation at global scale as indicators of water security

    Science.gov (United States)

    De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.

    2015-12-01

    A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.

  15. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  16. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  17. The US Global Change Data and Information Management Program Plan

    International Nuclear Information System (INIS)

    1992-01-01

    The US Global Change Research Program (USGCRP) requires massive quantities of highly diverse data and information to improve our understanding of global change processes. The Committee on Earth and Environmental Sciences (CEES) comprises Federal agencies that need to provide reliable data and information for this purpose from existing programs and archives and from new activities designed to improve upon the data and information. This US Global Change Data and Information Management Program Plan commits the participating Federal agencies to work with each other, with academia, and with the international community to make it as easy as possible for researchers and others to access and use global change data and information. Toward this end, the agencies are organizing a Global Change Data and Information System (GCDIS), which takes advantage of the mission resources and responsibilities of each agency. Sources for global change data and information are national and international agency programs, including those focused on the USGCRP, such as NASA's Earth Observing System [EOS] and other agency global change initiatives and those contributing to the USGCRP from other agency programs not focused on global change. Data and information include raw data from observation systems, value-added data from data assembly activities, and derived data and information from models and other investigations. Additional data and information are identified from appropriate sources including academia and the international community

  18. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  19. U.S. Global Change Research Program

    Science.gov (United States)

    ... Announcing... Read more The Deepening Story of How Climate Change Threatens Human Health Read more Celebrating the 25th Anniversary of the U.S. Global Change Research... Read more Nomination Period Open for the Sustained National ... more Connecting America’s Communities with Actionable Climate ...

  20. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  1. U.S. Global Change Research Program Budget Crosscut

    Data.gov (United States)

    Office of Science and Technology Policy, Executive Office of the President — U.S. Global Change Research Program budget authority for Agency activities in which the primary focus is on:Observations, research, and analysis of climate change...

  2. Nuclear Security Education in “non-Nuclear” Countries – Inseparable Component of Global Nuclear Security Scheme. Example of Montenegro

    International Nuclear Information System (INIS)

    Jovanovic, S.

    2014-01-01

    Global regime of nuclear security cannot be complete and functional if all countries are not involved; • Apart from the fact that developed nuclear countries are crucial in this sense (and determining the system), due attention should be paid to small, developing, “nonnuclear” ones; • Small problems in big countries are often big problems in small countries – so it is with HRD in nuclear related fields; • Everything is based on competence, with education being fundamental for building it up; • To that aim, the role of universities is of utmost importance, while networking is another corner stone; • Experience of Montenegro, perhaps exemplary in the above context, is discussed. (author)

  3. Global pest management program wins international award

    OpenAIRE

    Rich, Miriam Sommers

    2009-01-01

    An agricultural research program managed at Virginia Tech has won an international award for its work with pest-management practices that show economic benefits with minimal impact on health and the environment.

  4. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    Science.gov (United States)

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  5. Global health security: the wider lessons from the west African Ebola virus disease epidemic

    Science.gov (United States)

    Heymann, David L; Chen, Lincoln; Takemi, Keizo; Fidler, David P; Tappero, Jordan W; Thomas, Mathew J; Kenyon, Thomas A; Frieden, Thomas R; Yach, Derek; Nishtar, Sania; Kalache, Alex; Olliaro, Piero L; Horby, Peter; Torreele, Els; Gostin, Lawrence O; Ndomondo-Sigonda, Margareth; Carpenter, Daniel; Rushton, Simon; Lillywhite, Louis; Devkota, Bhimsen; Koser, Khalid; Yates, Rob; Dhillon, Ranu S; Rannan-Eliya, Ravi P

    2018-01-01

    The Ebola virus disease outbreak in West Africa was unprecedented in both its scale and impact. Out of this human calamity has come renewed attention to global health security—its definition, meaning, and the practical implications for programmes and policy. For example, how does a government begin to strengthen its core public health capacities, as demanded by the International Health Regulations? What counts as a global health security concern? In the context of the governance of global health, including WHO reform, it will be important to distil lessons learned from the Ebola outbreak. The Lancet invited a group of respected global health practitioners to reflect on these lessons, to explore the idea of global health security, and to offer suggestions for next steps. Their contributions describe some of the major threats to individual and collective human health, as well as the values and recommendations that should be considered to counteract such threats in the future. Many different perspectives are proposed. Their common goal is a more sustainable and resilient society for human health and wellbeing. PMID:25987157

  6. Centre for Global Development Visiting Fellowship Program | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Center for Global Development (CGD), located in Washington DC, is a globally preeminent think tank with unique networking and reach. Its Visiting Fellowship Program offers fellowships to scholars from think tanks and academic research institutions in Africa, Asia, and Latin America. Over the period from 2012 to2017, ...

  7. Exploring Adolescents' Thinking about Globalization in an International Education Program

    Science.gov (United States)

    Myers, John P.

    2010-01-01

    This research examined US high school students' thinking about economic and cultural globalization during their participation in an international education program. The findings mapped the students' categories for the two aspects of globalization and showed that the students' positions were shaped by relatively stable narratives characterizing the…

  8. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  9. Global Hotspots of Conflict Risk between Food Security and Biodiversity Conservation

    OpenAIRE

    Molotoks, Amy; Dawson, Terence Peter

    2017-01-01

    The global challenges of food security and biodiversity are rarely addressed together, though recently there has been an increasing awareness that the two issues are closely related. The majority of land available for agriculture is already used for food production, but despite the productivity gains, one in nine people worldwide are classified as food insecure. There is an increasing risk that addressing food insecurity through methods such as agricultural expansion orintensification could l...

  10. The NPT regime, present and future global security: an American view

    International Nuclear Information System (INIS)

    Thompson, Sam.

    1987-01-01

    Although not perfect, an international non-proliferation regime as set out by the IAEA and Non-Proliferation Treaty is in existence. The history of the involvement of the United States in the development of this regime is mentioned as a background to explaining the current approach of the Reagan Administration to non-proliferation. Trends and challenges which may affect future global security are then identified and discussed. The author is optimistic about the future. (U.K.)

  11. Energy Security and Economics of Indian Biofuel Strategy in a Global Context

    OpenAIRE

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur; Baka, Jenn

    2011-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for climate change mitigation and greater energy security for many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks - global warming pollution and negative economic impacts of oil price hikes. This paper examines India's options for managing energy price risk ...

  12. THE FACTOR OF ENERGY-INFORMATION SECURITY IN THE FRAMEWORK OF GLOBAL CIVILIZATION-RELATED CHANGES

    OpenAIRE

    Alexey Viktorovich SUHORUKHIH

    2015-01-01

    The paper examined the grounds having involved global social and cultural changes, and emphasized the precedence taken by an energy-information component to the geopolitical dynamics of the civilization continuum. The study emphasized the relevance of new facets in social and cultural insight urged to respond to challenges of direct mental hazards emerging over the world, and requirement of energy-information security the civilization has sought for, assumed to be the framework for considerin...

  13. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  14. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  15. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  16. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  17. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  18. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  19. Achieving sustainable irrigation water withdrawals: global impacts on food security and land use

    Science.gov (United States)

    Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve

    2017-10-01

    Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.

  20. Strengthening global health security by embedding the International Health Regulations requirements into national health systems.

    Science.gov (United States)

    Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin

    2018-01-01

    The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.

  1. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  2. Declining global per capita agricultural production and warming oceans threaten food security

    Science.gov (United States)

    Funk, Christopher C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that is grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be determined by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices and policies. This paper discusses several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14% between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21st century food availability in some countries by disrupting moisture transports and bringing down dry air over crop growing areas. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced rainfall during the main growing season along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, this study presents an analysis of emerging

  3. Declining Global Per Capita Agricultural Production and Warming Oceans Threaten Food Security

    Science.gov (United States)

    Funk, Chris C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that was grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be controlled by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices, and policies. In this paper we discuss several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia, and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14 percent between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21 st century food availability by disrupting Indian Ocean moisture transports and tilting the 21 st century climate toward a more El Nino-like state. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced main growing season rainfall along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, we present an analysis of

  4. Teaching Global Issues in an Undergraduate Program

    Science.gov (United States)

    Zapalska, Alina M.; Wingrove-Haugland, Erik; LaMonica, Christopher; Rivero, Elizabeth

    2013-01-01

    In preparing cadets to be officers, the U.S. Coast Guard Academy (CGA) is committed to developing "the whole person." CGA has increasingly developed program-specific ways to achieve educational goals and learning outcomes. While character development and ethical education have long been important learning outcomes, today's CGA curriculum…

  5. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  6. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    International Nuclear Information System (INIS)

    Song, S. H.; Lee, M. S.; Kim, T. H.; Park, C. H.; Park, S. P.; Kim, H. S.

    2014-01-01

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system

  7. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, S. H. [Korea University, Seoul (Korea, Republic of); Lee, M. S.; Kim, T. H. [Formal Work Inc., Seoul (Korea, Republic of); Park, C. H. [LINE Corp., Tokyo (Japan); Park, S. P. [Ahnlab Inc., Seoul (Korea, Republic of); Kim, H. S. [Sejong University, Seoul (Korea, Republic of)

    2014-08-15

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system.

  8. Desovereignization of national state, economy and security in terms of globalization

    Directory of Open Access Journals (Sweden)

    Rakić Mile M.

    2014-01-01

    Full Text Available In current modern age of worldwide processes of globalization and globalism a process of desovereigntization of national state and economy has become a general process. Therefore national state has been faced with numerous challenges and it has been in a permanent state of crisis. Within the process of globalization most often rich enclaves of national states make attempts to integrate themselves into neoliberal capitalist system, while poor and backward enclaves become abandoned and so national states become disintegrated. First of all it is necessary to search for causes of ethno-religious conflicts and a national separatism in the field of economy. Within the globalization environment it happened that old entities, national state, national economy and national security gained totally new meanings. By using a method of comparative analysis of document contents and consitutional and political practice alike it is possible to reach conclusion that a great number of modern national states, including the Republic of Serbia among them, have found themselves in the state of permanent crisis, and the state crisis implies, before anything else, the crisis of state sovereignty. The state gets destroyed both from inside and outside in different ways. By using a quality method it is confirmed that within a state there comes an overstepping of constitutional regulations which encompass, before else, the issues of national economy and national security, and it is achieved in particular by seizure of economic sovereignty.

  9. The Fukushima nuclear accident and its effect on global energy security

    International Nuclear Information System (INIS)

    Hayashi, Masatsugu; Hughes, Larry

    2013-01-01

    The March 2011 nuclear accident at the Fukushima Daiichi nuclear power station affected both short- and long-term energy-security in Japan, resulting in crisis-driven, ad hoc energy policy and, because of the decision to shutter all nuclear reactors, increased the country’s demand for fossil fuels, primarily natural gas. However, the effects of the accident on energy security were not restricted to Japan; for example, the worldwide availability and affordability of liquefied natural gas were affected by Japan’s increased demand; while the accident itself resulted in the loss of public acceptability of nuclear power and led countries, such as Germany and Italy, to immediately shut down some of the nuclear reactors or abandon plans to build new ones. This paper examines some of the short-term effects on global energy security following the accident at Fukushima, focusing on the main replacement fuel, liquefied natural gas. It shows, amongst other things, that the accident increased investment in liquefied natural gas projects around the world. The paper shows that despite Fukushima contributing to nuclear power’s loss of acceptability in most developed countries, it is still seen as an essential way of improving energy security in many countries and, despite what its critics may say, will probably continue to be used as a significant source of low-carbon electricity. - Highlights: ► Japan’s demands for fossil fuels raised the price of LNG and low-sulfur crudes. ► The accident affected the global price of uranium and producer share prices. ► The accident accelerated foreign-direct investment in LNG projects worldwide. ► The change in public perception toward nuclear power was relatively limited. ► A radical shift in global nuclear policy seems to be unrealistic after Fukushima

  10. The Galileo Teacher Training Program Global Efforts

    Science.gov (United States)

    Doran, R.; Pennypacker, C.; Ferlet, R.

    2012-08-01

    The Galileo Teacher Training Program (GTTP) successfully named representatives in nearly 100 nations in 2009, the International Year of Astronomy (IYA2009). The challenge had just begun. The steps ahead are how to reach educators that might benefit from our program and how to help build a more fair and science literate society, a society in which good tools and resources for science education are not the privilege of a few. From 2010 on our efforts have been to strengthen the newly formed network and learn how to equally help educators and students around the globe. New partnerships with other strong programs and institutions are being formed, sponsorship schemes being outlined, new tools and resources being publicized, and on-site and video conference training conducted all over the world. Efforts to officially accredit a GTTP curriculum are on the march and a stronger certification process being outlined. New science topics are being integrated in our effort and we now seek to discuss the path ahead with experts in this field and the community of users, opening the network to all corners of our beautiful blue dot. The main aim of this article is to open the discussion regarding the urgent issue of how to reawaken student interest in science, how to solve the gender inequality in science careers, and how to reach the underprivileged students and open to them the same possibilities. Efforts are in strengthening the newly formed network and learning how to equally help educators and students around the globe.

  11. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  12. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  13. Global Food Security-support data at 30 m (GFSAD30)

    Science.gov (United States)

    Thenkabail, P. S.

    2013-12-01

    Monitoring global croplands (GCs) is imperative for ensuring sustainable water and food security to the people of the world in the Twenty-first Century. However, the currently available cropland products suffer from major limitations such as: (1) Absence of precise spatial location of the cropped areas; (b) Coarse resolution nature of the map products with significant uncertainties in areas, locations, and detail; (b) Uncertainties in differentiating irrigated areas from rainfed areas; (c) Absence of crop types and cropping intensities; and (e) Absence of a dedicated webdata portal for the dissemination of cropland products. Therefore, our project aims to close these gaps through a Global Food Security-support data at 30 m (GFSAD30) with 4 distinct products: 1. Cropland extentarea, 2. Crop types with focus on 8 crops that occupy 70% of the global cropland areas, 3. Irrigated versus rainfed, and 4. Cropping intensities: single, double, triple, and continuous cropping. The above 4 products will be generated for GFSAD for nominal year 2010 (GFSAD2010) based on Landsat 30m Global Land Survey 2010 (GLS2010) fused with Moderate Resolution Imaging Spectroradiometer (MODIS) 250m NDVI monthly maximum value composites (MVC) of 2009-2011 data, and suite of secondary data (e.g., long-term precipitation, temperature, GDEM elevation). GFSAD30 will be produced using three mature cropland mapping algorithms (CMAs): 1. Spectral matching techniques; 2. A cropland classification algorithm (ACCA) that is rule-based; and 3. Hierarchical segmentation (HSeg) algorithm. Funded by NASA MEaSUREs, GFSAD30 will make significant contributions to Earth System Data Records (ESDRs), Group on Earth Observations (GEO) Agriculture and Water Societal Beneficial Areas (GEO Ag. SBAs), GEO Global Agricultural Monitoring Initiative (GEO GLAM), and the recent 'Big Data' initiative by the White House. The project has the support of USGS Working Group on Global Croplands (https://powellcenter.usgs.gov/globalcroplandwater/).

  14. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  15. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  16. Rising food costs & global food security: Key issues & relevance for India

    Science.gov (United States)

    Gustafson, Daniel J.

    2013-01-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers’ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all. PMID:24135190

  17. Rising food costs & global food security: Key issues & relevance for India

    Directory of Open Access Journals (Sweden)

    Daniel J Gustafson

    2013-01-01

    Full Text Available Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers′ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country′s reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  18. Rising food costs & global food security: key issues & relevance for India.

    Science.gov (United States)

    Gustafson, Daniel J

    2013-09-01

    Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers' incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.

  19. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  20. Quantifying the impact of weather extremes on global food security: A spatial bio-economic approach

    Directory of Open Access Journals (Sweden)

    Sika Gbegbelegbe

    2014-08-01

    Full Text Available This study uses a spatial bio-economic modelling framework to estimate the impact of the 2012 weather extreme in the USA on food security in the developing world. The study also quantifies the potential effects of a similar weather extreme occurring in 2050 under climate change. The study results indicate that weather extremes that affect maize productivity in key grain baskets can negatively affect food security in vulnerable countries. The 2012 weather extreme which occurred in the USA reduced US and global maize production by 29% compared to trend; maize consumption in the country decreased by 5% only and this resulted in less surplus maize for exports from the largest maize exporter in the world. Global maize production decreased by 6% compared to trend. The decrease in global maize production coupled with a reduction in the volume of global maize exports worsened food insecurity in eastern Africa, the Caribbean and Central America and India. The effects of the weather extreme on global food security would be worse, if the latter were to occur under climate change in 2050, assuming no climate change adaptation worldwide over the years. In addition, the hardest-hit regions would remain the same, whether the weather extreme occurs in 2012 instead of 2050: Sub-Saharan Africa (SSA, South Asia and the Latin America and Caribbean (LAC region. However, sustained growth in per capita income across world economies between 2000 and 2050 would allow few countries in SSA and the LAC region to virtually eliminate hunger within their borders. In these countries, per capita income would be high enough by 2050 to completely offset the negative effect of the weather extreme. The study results are also consistent with USDA׳s estimates on US and global maize production and consumption in 2012 after the weather extreme. Some discrepancy is found on the volume of global maize trade; this implies that the bio-economic model likely overestimates the effect of the

  1. Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm

    Science.gov (United States)

    Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid

    2016-01-01

    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques. PMID:27384239

  2. Secure Scientific Applications Scheduling Technique for Cloud Computing Environment Using Global League Championship Algorithm.

    Science.gov (United States)

    Abdulhamid, Shafi'i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid

    2016-01-01

    Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.

  3. 'Vulnerability is universal': considering the place of 'security' and 'vulnerability' within contemporary global health discourse.

    Science.gov (United States)

    Brown, Tim

    2011-02-01

    The question of global health has, at least since 9/11, (re)emerged as one of the world's key geopolitical issues and, as many scholars have noted, this increased attention to the state of world health is especially focused on questions of national security and vulnerability. Despite its prominence in political, health policy and scholarly circles, health geographers have tended to overlook this particular aspect of global health discourse. This paper seeks to redress this lacuna. It does so for three reasons. The first lies in the idea that this discourse is inherently geographical; after all, it is in essence concerned with the flows of human and non-human agents within and, more importantly here, across, national borders. It is also of interest because a focus on vulnerability allows for an analysis that goes beyond the current fixation with emerging and re-emerging infectious diseases. Although it is certainly true that the concern with such diseases dominates, and the recent focus upon H1N1 swine flu is testament to that, there is also a suggestion that the processes associated with the enhanced threat posed by these diseases are similar to those that have caused non-communicable diseases to become a global health problem too. A third reason for focussing on this aspect of the global health discourse is that the subsequent search for 'security' is highly problematic; especially if we consider the question of "who is to be protected, and from what". The aim of the paper is, then, to offer a critical review of the international discourse on global health and to highlight its relevance to scholars that self-identify as health and medical geographers. Copyright © 2010 Elsevier Ltd. All rights reserved.

  4. Global Health Engagement and The Department of Defense as a Vehicle for Security and Sustainable Global Health.

    Science.gov (United States)

    Moten, Asad; Schafer, Daniel; Burkett, Edwin K

    2018-01-01

    The Unites States Department of Defense (DoD) is viewed by many in the general public as a monolithic government entity whose primary purpose is to coordinate this country's ability to make war and maintain a military presence around the world. However, the DoD is in fact a multidimensional organization whose global impact is as expansive as it is varying and is responsible for far-reaching global health interventions. The United States has worked toward providing long-term care among host nation populations by providing training in several areas related to medicine, with positive results. These efforts can be built upon with substantial positive effects. Building health infrastructure and capacity around the world is essential. The DoD is the most generously funded agency in the world, and the resources at its disposal provide the opportunity to make great gains in the long term in terms of both health and security worldwide. With efficient and careful use of DoD resources, and partnerships with key non-governmental organizations with specialized knowledge and great passion, partnerships can be forged with communities around the world to ensure that public health is achieved in even the most underserved communities. A move toward creating sustainable health systems with long-term goals and measurable outcomes is an essential complement to the already successful disaster and emergency relief that the United States military already provides. By ensuring that communities around the world are both provided with access to the sustainable health care they need and that emergency situations can be responded to in an efficient way, the United States can serve its duty as a leader in sharing expertise and resources for the betterment and security of all humankind. Published by Oxford University Press on behalf of the Association of Military Surgeons of the United States 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  5. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  6. Establishing cyber security programs for I and C systems at nuclear facilities

    International Nuclear Information System (INIS)

    Waedt, Karl

    2012-01-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  7. Establishing cyber security programs for I and C systems at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Waedt, Karl [AREVA NP GmbH (Germany)

    2012-11-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  8. Collective Security in the Context of Globalization. The Case of Romania

    Directory of Open Access Journals (Sweden)

    Vlad Dumitrache

    2016-06-01

    Full Text Available European countries have taken part in the Globalization process ever since the end of the Second World War. Being active members of international institutions like the IMF, World Bank Group, NATO or the WTO, the European countries have even developed a collective entity of their own, that of the European Union. In later years, Eastern European countries like Romania have also become a part of this globalised system. It is the aim of this paper to present the effects that this integration has brought in terms of economic development and security challenges for EU member states, by taking into consideration the example of Romania.

  9. Legal and regulatory capacity to support the global health security agenda.

    Science.gov (United States)

    Morhard, Ryan; Katz, Rebecca

    2014-01-01

    On February 13, 2014, 27 nations, along with 3 international organizations, launched the Global Health Security Agenda (GHSA). The intent of GHSA is to accelerate progress in enabling countries around the world to prevent, detect, and respond to public health emergencies-capacities to be achieved through 9 core objectives. Building national, regional, and international capacity includes creating strong legal and regulatory regimes to support national and international capacities to prevent, detect, and respond to public health emergencies. Accordingly, establishing and reinforcing international and national-level legal preparedness is central to advancing elements of each of the 9 objectives of the GHSA.

  10. Global partnering related to nuclear materials safeguards and security - A pragmatic approach to international safeguards work

    International Nuclear Information System (INIS)

    Stanford, Dennis

    2007-01-01

    This paper documents issues Nuclear Fuel Services, Inc. has addressed in the performance of international work to safeguards and security work. It begins with a description of the package we put together for a sample proposal for the Global Threat Reduction Initiative, for which we were ranked number one for technical approach and cost, and concludes with a discussion of approaches that we have taken to performing this work, including issues related to performing the work as part of a team. The primary focus is on communication, workforce, equipment, and coordination issues. Finally, the paper documents the rules that we use to assure the work is performed safely and successfully. (author)

  11. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  12. GEOGLAM Crop Assessment Tool: Adapting from global agricultural monitoring to food security monitoring

    Science.gov (United States)

    Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.

    2014-12-01

    The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.

  13. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  14. World Energy Balance Outlook and OPEC Production Capacity: Implications for Global Oil Security

    Directory of Open Access Journals (Sweden)

    Azadeh M. Rouhani

    2012-07-01

    Full Text Available The imbalance between energy resource availability, demand, and production capacity, coupled with inherent economic and environmental uncertainties make strategic energy resources planning, management, and decision-making a challenging process. In this paper, a descriptive approach has been taken to synthesize the world’s energy portfolio and the global energy balance outlook in order to provide insights into the role of Organization of Petroleum Exporting Countries (OPEC in maintaining “stability” and “balance” of the world’s energy market. This synthesis illustrates that in the absence of stringent policies, i.e., if historical trends of the global energy production and consumption hold into the future, it is unlikely that non-conventional liquid fuels and renewable energy sources will play a dominant role in meeting global energy demand by 2030. This should be a source of major global concern as the world may be unprepared for an ultimate shift to other energy sources when the imminent peak oil production is reached. OPEC’s potential to impact the supply and price of oil could enable this organization to act as a facilitator or a barrier for energy transition policies, and to play a key role in the global energy security through cooperative or non-cooperative strategies. It is argued that, as the global energy portfolio becomes more balanced in the long run, OPEC may change its typical high oil price strategies to drive the market prices to lower equilibria, making alternative energy sources less competitive. Alternatively, OPEC can contribute to a cooperative portfolio management approach to help mitigate the gradually emerging energy crisis and global warming, facilitating a less turbulent energy transition path while there is time.

  15. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  16. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  17. Securing classification and regulatory approval for deepwater projects: management challenges in a global environment

    Energy Technology Data Exchange (ETDEWEB)

    Feijo, Luiz P.; Burton, Gareth C. [American Bureau of Shipping (ABS), Rio de Janeiro, RJ (Brazil)

    2008-07-01

    As the offshore industry continues to develop and move into increasingly deeper waters, technological boundaries are being pushed to new limits. Along with these advances, the design, fabrication and installation of deepwater oil and gas projects has become an increasingly global endeavor. After providing an overview of the history and role of Classification Societies, this paper reviews the challenges of securing classification and regulatory approval in a global environment. Operational, procedural and technological changes which one Classification Society; the American Bureau of Shipping, known as ABS, has implemented to address these challenges are presented. The result of the changes has been a more customized service aiming at faster and more streamlined classification approval process. (author)

  18. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  19. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  20. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...

  1. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  2. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  3. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    Science.gov (United States)

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. An Enterprise Security Program and Architecture to Support Business Drivers

    OpenAIRE

    Brian Ritchot

    2013-01-01

    This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropr...

  6. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  7. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  8. Global maize trade and food security: implications from a social network model.

    Science.gov (United States)

    Wu, Felicia; Guclu, Hasan

    2013-12-01

    In this study, we developed a social network model of the global trade of maize: one of the most important food, feed, and industrial crops worldwide, and critical to food security. We used this model to analyze patterns of maize trade among nations, and to determine where vulnerabilities in food security might arise if maize availability was decreased due to factors such as diversion to nonfood uses, climatic factors, or plant diseases. Using data on imports and exports from the U.N. Commodity Trade Statistics Database for each year from 2000 to 2009 inclusive, we summarized statistics on volumes of maize trade between pairs of nations for 217 nations. There is evidence of market segregation among clusters of nations; with three prominent clusters representing Europe, Brazil and Argentina, and the United States. The United States is by far the largest exporter of maize worldwide, whereas Japan and the Republic of Korea are the largest maize importers. In particular, the star-shaped cluster of the network that represents U.S. maize trade to other nations indicates the potential for food security risks because of the lack of trade these other nations conduct with other maize exporters. If a scenario arose in which U.S. maize could not be exported in as large quantities, maize supplies in many nations could be jeopardized. We discuss this in the context of recent maize ethanol production and its attendant impacts on food prices elsewhere worldwide. © 2013 Society for Risk Analysis.

  9. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  10. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  11. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  12. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  13. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  14. Soil erosion, climate change and global food security: challenges and strategies.

    Science.gov (United States)

    Rhodes, Christopher J

    2014-01-01

    An overview is presented of the determined degree of global land degradation (principally occurring through soil erosion), with some consideration of its possible impact on global food security. Most determinations of the extent of land degradation (e.g. GLASOD) have been made on the basis of "expert judgement" and perceptions, as opposed to direct measurements of this multifactorial phenomenon. More recently, remote sensing measurements have been made which indicate that while some regions of the Earth are "browning" others are "greening". The latter effect is thought to be due to fertilisation of the growth of biomass by increasing levels of atmospheric CO2, and indeed the total amount of global biomass was observed to increase by 3.8% during the years 1981-2003. Nonetheless, 24% of the Earth's surface had occasioned some degree of degradation in the same time period. It appears that while long-term trends in NDVI (normalised difference vegetation index) derivatives are only broad indicators of land degradation, taken as a proxy, the NDVI/NPP (net primary productivity) trend is able to yield a benchmark that is globally consistent and to illuminate regions in which biologically significant changes are occurring. Thus, attention may be directed to where investigation and action at the ground level is required, i.e. to potential "hot spots" of land degradation and/or erosion. The severity of land degradation through soil erosion, and an according catastrophic threat to the survival of humanity may in part have been overstated, although the rising human population will impose inexorable demands for what the soil can provide. However the present system of industrialised agriculture would not be possible without plentiful provisions of cheap crude oil and natural gas to supply fuels, pesticides, herbicides and fertilisers. It is only on the basis of these inputs that it has been possible for the human population to rise above 7 billion. Hence, if the cheap oil and gas

  15. Security Assistance in Nigeria: Shaping the International Environment to Meet U.S. National Security Objectives in the Global Era

    National Research Council Canada - National Science Library

    Prendergast, Kenneth

    2003-01-01

    .... While American interests in Sub-Saharan Africa are significant and growing, there are also important transnational security threats, infectious diseases, organized international criminal activities...

  16. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  17. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  18. The effectiveness of online gaming as part of a security awareness program

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2014-07-01

    Full Text Available the human element whose actions can be considered as erratic and unpredictable thus posing a threat to the security of the organization. Security awareness programs aim to equip users of cyberspace with the necessary knowledge to identify and mitigate...

  19. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  20. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  1. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  2. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, Doris E.

    2005-01-01

    In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

  3. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  4. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  5. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  6. Design of large scale applications of secure multiparty computation : secure linear programming

    NARCIS (Netherlands)

    Hoogh, de S.J.A.

    2012-01-01

    Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allows a set of mutually distrusting parties to perform a computation on their private information in such a way that as little as possible is revealed about each private input. The early results of

  7. Monitoring Global Food Security with New Remote Sensing Products and Tools

    Science.gov (United States)

    Budde, M. E.; Rowland, J.; Senay, G. B.; Funk, C. C.; Husak, G. J.; Magadzire, T.; Verdin, J. P.

    2012-12-01

    Global agriculture monitoring is a crucial aspect of monitoring food security in the developing world. The Famine Early Warning Systems Network (FEWS NET) has a long history of using remote sensing and crop modeling to address food security threats in the form of drought, floods, pests, and climate change. In recent years, it has become apparent that FEWS NET requires the ability to apply monitoring and modeling frameworks at a global scale to assess potential impacts of foreign production and markets on food security at regional, national, and local levels. Scientists at the U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center and the University of California Santa Barbara (UCSB) Climate Hazards Group have provided new and improved data products as well as visualization and analysis tools in support of the increased mandate for remote monitoring. We present our monitoring products for measuring actual evapotranspiration (ETa), normalized difference vegetation index (NDVI) in a near-real-time mode, and satellite-based rainfall estimates and derivatives. USGS FEWS NET has implemented a Simplified Surface Energy Balance (SSEB) model to produce operational ETa anomalies for Africa and Central Asia. During the growing season, ETa anomalies express surplus or deficit crop water use, which is directly related to crop condition and biomass. We present current operational products and provide supporting validation of the SSEB model. The expedited Moderate Resolution Imaging Spectroradiometer (eMODIS) production system provides FEWS NET with an improved NDVI dataset for crop and rangeland monitoring. eMODIS NDVI provides a reliable data stream with a relatively high spatial resolution (250-m) and short latency period (less than 12 hours) which allows for better operational vegetation monitoring. We provide an overview of these data and cite specific applications for crop monitoring. FEWS NET uses satellite rainfall estimates as inputs for

  8. Growing water scarcity in agriculture: future challenge to global water security.

    Science.gov (United States)

    Falkenmark, Malin

    2013-11-13

    As water is an essential component of the planetary life support system, water deficiency constitutes an insecurity that has to be overcome in the process of socio-economic development. The paper analyses the origin and appearance of blue as well as green water scarcity on different scales and with particular focus on risks to food production and water supply for municipalities and industry. It analyses water scarcity originating from both climatic phenomena and water partitioning disturbances on different scales: crop field, country level and the global circulation system. The implications by 2050 of water scarcity in terms of potential country-level water deficits for food self-reliance are analysed, and the compensating dependence on trade in virtual water for almost half the world population is noted. Planetary-scale conditions for sustainability of the global water circulation system are discussed in terms of a recently proposed Planetary Freshwater Boundary, and the consumptive water use reserve left to be shared between water requirements for global food production, fuelwood production and carbon sequestration is discussed. Finally, the importance of a paradigm shift in the further conceptual development of water security is stressed, so that adequate attention is paid to water's fundamental role in both natural and socio-economic systems.

  9. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  10. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  11. How Academies use science to enhance global security and well-being.

    Science.gov (United States)

    Boright, John

    2017-01-01

    Science academies were originally created to facilitate science communication and later to recognize excellence. But in the last 20 years some 150 academies of science, engineering,and medicine around the world have united to cooperate in contributing to human welfare, by: 1. Providing evidence-based inputs to national, regional, and global policies addressing human needs, and 2. Conducting cooperative programs to increase the capacity of academies to provide such advice, and to better connect academies to publics and to policy makers. Examples: At the global level, 112 academies of science produce brief common statements on major global issues. They have also created an organization to provide in-depth reports on major issues such as a transition to sustainable energy systems, boosting agricultural productivity in Africa, and a guide to responsible conduct in the global research enterprise. Regional networks of those academies, in Africa, the Americas, Asia, and Europe conduct program on topics such as water, energy, engagement of women in science, and science education. They also help and mentor new academies.

  12. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  13. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  14. Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.

    Science.gov (United States)

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton

    2012-05-01

    Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.

  15. Global warming mitigation strategies and programs for power plant developers

    International Nuclear Information System (INIS)

    Holmes, N.R.

    1992-01-01

    Power plant developers are increasingly being surprised by regulatory agencies requiring them to mitigate the carbon dioxide(CO 2 ) emissions from their proposed power plants, as part of the plant's operating permit conditions. Since carbon dioxide is not a criteria pollutant with a National Ambient Air Quality Standard, power plant developers are often troubled by this additional regulatory requirement. This presentation will describe the contribution that CO 2 makes to global warming, the role of trees and forests as carbon sequesters or sinks, some non-forestry related and forestry related mitigation programs, including the advantages, disadvantages, and some cost estimates for the forestry related CO 2 mitigation programs. As public concern about global warming continues to escalate, it is almost certain that regulatory agencies will increase their focus on CO 2 mitigation

  16. Global food and fibre security threatened by current inefficiencies in fungal identification

    Science.gov (United States)

    2016-01-01

    Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity, life cycle stages and population structures. The majority of current fungal species descriptions lack even the most basic genetic data that could address at least some of these issues. Such information is essential for accurate fungal identifications, to link critical metadata and to understand the real and potential impact of fungal pathogens on production and natural ecosystems. Because international trade in plant products and introduction of pathogens to new areas is likely to continue, the manner in which fungal pathogens are identified should urgently be reconsidered. The technologies that would provide appropriate information for biosecurity and quarantine already exist, yet the scientific community and the regulatory authorities are slow to embrace them. International agreements are urgently needed to enforce new guidelines for describing plant pathogenic fungi (including key DNA information), to ensure availability of relevant data and to modernize the phytosanitary systems that must deal with the risks relating to trade-associated plant pathogens. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080994

  17. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  18. The Global Seismic Hazard Assessment Program (GSHAP - 1992/1999

    Directory of Open Access Journals (Sweden)

    D. Giardini

    1999-06-01

    Full Text Available The United Nations, recognizing natural disasters as a major threat to human life and development, designed the 1990-1999 period as the International Decade for Natural Disaster Reduction (UN/IDNDR; UN Res. 42/169/ 1987. Among the IDNDR Demonstration Projects is the Global Seismic Hazard Assessment Program (GSHAP, launched in 1992 by the International Lithosphere Program (ILP and implemented in the 1992-1999 period. In order to mitigate the risk associated to the recurrence of earthquakes, the GSHAP promoted a regionally coordinated, homogeneous approach to seismic hazard evaluation. To achieve a global dimension, the GSHAP established initially a mosaic of regions and multinational test areas, then expanded to cover whole continents and finally the globe. The GSHAP Global Map of Seismic Hazard integrates the results obtained in the regional areas and depicts Peak-Ground-Acceleration (PGA with 10% chance of exceedance in 50 years, corresponding to a return period of 475 years. All regional results and the Global Map of Seismic Hazard are published in 1999 and available on the GSHAP homepage on http://seismo.ethz.ch/GSHAP/.

  19. Establishing a national biological laboratory safety and security monitoring program.

    Science.gov (United States)

    Blaine, James W

    2012-12-01

    The growing concern over the potential use of biological agents as weapons and the continuing work of the Biological Weapons Convention has promoted an interest in establishing national biological laboratory biosafety and biosecurity monitoring programs. The challenges and issues that should be considered by governments, or organizations, embarking on the creation of a biological laboratory biosafety and biosecurity monitoring program are discussed in this article. The discussion focuses on the following questions: Is there critical infrastructure support available? What should be the program focus? Who should be monitored? Who should do the monitoring? How extensive should the monitoring be? What standards and requirements should be used? What are the consequences if a laboratory does not meet the requirements or is not willing to comply? Would the program achieve the results intended? What are the program costs? The success of a monitoring program can depend on how the government, or organization, responds to these questions.

  20. Radiation effects on man health, environment, safety, security. Global Chernobyl mapping

    International Nuclear Information System (INIS)

    Bebeshko, V.; Bazyka, D.; Volovik, S.; Loganovsky, K.; Sushko, V.; Siedow, J.; Cohen, H.; Ginsburg, G.; Chao, N.; Chute, J.

    2007-01-01

    Complete text of publication follows. Objectives: Ionizing radiation is a primordial terrestrial and extraterrestrial background and archetypal environmental stress-factor for life origin, evolution, and existence. We all live in radiation world inevitably involving nuclear energy production, nuclear weapon, nuclear navy, radioactive waste, pertinent medical diagnostics and treatment, etc with connected certain probability of relevant accidents and terrorist attack, space and jet travels, high natural background radiation, etc - actual and potential sources of radiation exposures and effects. State-of- the art integral fundamental research on radiation effects on man health, environment, safety, and security (REMHESS) is nowadays paramount necessity and challenge. Methods and results: In given generalized conceptual framework unique 20 years Chernobyl multidimensional research and databases for radiation effects on man's all organism systems represent invaluable original basis and resources for mapping Chernobyl data and REMHESS challenge. Granted by DOE brand new Chernobyl Research and Service Project based on 'Sarcophagus-II' (Object 'Shelter') workers only one in radiation history baseline cohort, corresponding biorepository prospective dynamic data, integrated conceptual database system, and 'state of the art' 'omics' (genomics, proteomics, metabolomics) analysis is designed specifically for coherent addressing global REMHESS problems. In this connection 'Sarcophagus-II' is only one unique universal model. Conclusions: The fundamental goals of novel strategic Project and global Chernobyl mapping are to determine specific 'omics' signatures of radiation for man depending of exposure peculiarity to understand ultimate molecular mechanisms of radiation effects, gene environment interactions, etiology of organisms systems disorders and diseases, and to develop new biomarkers and countermeasures to protect man health in the framework of global REMHESS challenge

  1. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  2. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  3. Toward a global space exploration program: A stepping stone approach

    Science.gov (United States)

    Ehrenfreund, Pascale; McKay, Chris; Rummel, John D.; Foing, Bernard H.; Neal, Clive R.; Masson-Zwaan, Tanja; Ansdell, Megan; Peter, Nicolas; Zarnecki, John; Mackwell, Steve; Perino, Maria Antionetta; Billings, Linda; Mankins, John; Race, Margaret

    2012-01-01

    In response to the growing importance of space exploration in future planning, the Committee on Space Research (COSPAR) Panel on Exploration (PEX) was chartered to provide independent scientific advice to support the development of exploration programs and to safeguard the potential scientific assets of solar system objects. In this report, PEX elaborates a stepwise approach to achieve a new level of space cooperation that can help develop world-wide capabilities in space science and exploration and support a transition that will lead to a global space exploration program. The proposed stepping stones are intended to transcend cross-cultural barriers, leading to the development of technical interfaces and shared legal frameworks and fostering coordination and cooperation on a broad front. Input for this report was drawn from expertise provided by COSPAR Associates within the international community and via the contacts they maintain in various scientific entities. The report provides a summary and synthesis of science roadmaps and recommendations for planetary exploration produced by many national and international working groups, aiming to encourage and exploit synergies among similar programs. While science and technology represent the core and, often, the drivers for space exploration, several other disciplines and their stakeholders (Earth science, space law, and others) should be more robustly interlinked and involved than they have been to date. The report argues that a shared vision is crucial to this linkage, and to providing a direction that enables new countries and stakeholders to join and engage in the overall space exploration effort. Building a basic space technology capacity within a wider range of countries, ensuring new actors in space act responsibly, and increasing public awareness and engagement are concrete steps that can provide a broader interest in space exploration, worldwide, and build a solid basis for program sustainability. By engaging

  4. Measuring the Effect of Supplemental Nutrition Assistance Program (SNAP) Participation on Food Security.

    OpenAIRE

    James Mabli; Jim Ohls; Lisa Dragoset; Laura Castner; Betsy Santos

    2013-01-01

    The Supplemental Nutrition Assistance Program (SNAP) provides food assistance to more than 47 million low-income Americans every month. It aims to reduce hunger by facilitating beneficiaries’ access to enough food for a healthy, active lifestyle, otherwise known as "food security." Our study conducted for the Food and Nutrition Service of the U.S. Department of Agriculture shows that SNAP participation is associated with improved food security. The study is the largest and most rigorous one...

  5. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  6. A Response to: Global Security, Religion and Education Development--A Crisis for the Field of Comparative and International Education?

    Science.gov (United States)

    Ozanne, Bill

    2011-01-01

    This paper presents the author's response to "Global security, religion and education development: a crisis for the field of comparative and international education?" Prof. Lynn Davies's introduction to the Forum is interesting and provocative, and the author advances his response in the spirit of dialogue by looking at Davies's arguments, the…

  7. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  8. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    Science.gov (United States)

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  9. GLOBAL CHANGE RESEARCH NEWS #37: PUBLICATION OF "OUR CHANGING PLANET: THE FY 2002 U.S. GLOBAL CHANGE RESEARCH PROGRAM"

    Science.gov (United States)

    The EPA Global Change Research Program is pleased to inform you of the publication of the new Our Changing Planet: The FY 2002 U.S. Global Change Research Program. This annual report to the Congress was prepared under the auspices of the Committee on Environment and Natural Reso...

  10. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  11. Equitably Distributing Quality of Marine Security Guards Using Integer Programming

    Science.gov (United States)

    2013-03-01

    ARB BALMOD COM DoD DoS E HAF HQ 10 IP IQ LP MOS MCESG MSG MSGAT NLP NMC OSAB PCS PP&O Q RSO SAl SD SE SNCO T-ODP LIST OF...and Eurasia 2 Abu Dhabi, United Arab Emirates India and the Middle East 3 Bangkok, Thailand East Asia and Pacific 4 Fort Lauderdale, Florida South...integer, goal, and quadratic programming. LP models and nonlinear programming ( NLP ) models are very similar in model development for both maximizing

  12. The Geosphere - Biosphere international program and the global change

    International Nuclear Information System (INIS)

    Chanin, M.L.

    1991-01-01

    The objective of the Geosphere-Biosphere International Program (GBIP) is to achieve a correct approach of the various biogeochemical interactions between the different components of the environment (oceans, atmosphere, biosphere). The main themes are: study of the chemical regulation in the global atmosphere and influence of natural and anthropogenic processes on trace element cycles; influence of the oceanic biogeochemical processes on climates and their response to climatic changes; influence of soil utilization modification (especially coastal) on climates and ecosystems; interaction between vegetation and the water cycle; interaction between climatic changes, ecosystems and agricultural productivity; approaches to climate modelling. French component of the GBIP is presented [fr

  13. 78 FR 51192 - Secure Supply Chain Pilot Program

    Science.gov (United States)

    2013-08-20

    ... importers that volunteer to participate in partnership programs for highly compliant companies and pass a... to share the names of the participants and information related to these companies with other Federal... Letter, Cyber Letter, or Warning Letter, that cite violations of the Federal Food, Drug, and Cosmetic Act...

  14. Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques

    Directory of Open Access Journals (Sweden)

    T. R. Khabibullin

    2012-09-01

    Full Text Available The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.

  15. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  16. Beneficial impacts of an international grain reserve on global food security

    Science.gov (United States)

    Otto, C.; Schewe, J.; Puma, M. J.; Frieler, K.

    2017-12-01

    Highly volatile food prices on global markets challenge food security. Only in the last decade, two pronounced food price spikes severely affected vulnerable populations worldwide by increasing malnutrition and hunger. This has stirred up the debate upon the usefulness of an international grain reserve. Whereas advocates argue that it could damp damaging price extremes, opponents question its effectiveness and are concerned about associated market distortions and costs. However, to our knowledge, a comprehensive quantitative assessment is still missing. For this purpose, we introduce an agent-based dynamic multi-regional model that consistently accounts for intra-annual strategic as well as commercial storage holding. For the case of wheat, we first show that the model is able to reproduce historical world market prices (see Fig. 1(a)) and regional ending stocks (stocks see Fig.1(b) for global ending stocks) from 1980 to the present. Having a bi-annual timestep, the model enables us to single out the main drivers of past short-term price volatility: regional, mainly weather induced, production variations followed by trade policies as the second most important driver. The latter include, both, long-term stockholding management decisions as well as short-term regional political responses to scarcity situations such as export restrictions and restocking attempts. We then quantitatively model a strategic wheat reserve managed by an international body such as the UN. We discuss a management scheme for the reserve that aims at stabilizing prices within a price band by buying at low and selling at high prices (cf. Fig. 1). Importantly, in order to minimize market distortions, this scheme is not designed to damp out price volatility completely, but to merely avoid damaging price extremes. Thus, it preserves the incentive for producers to invest in agricultural development and it can only complement and not replace local efforts to increase the food system's resilience

  17. DEGAS: Dynamic Exascale Global Address Space Programming Environments

    Energy Technology Data Exchange (ETDEWEB)

    Demmel, James [Univ. of California, Berkeley, CA (United States)

    2018-02-23

    The Dynamic, Exascale Global Address Space programming environment (DEGAS) project will develop the next generation of programming models and runtime systems to meet the challenges of Exascale computing. The Berkeley part of the project concentrated on communication-optimal code generation to optimize speed and energy efficiency by reducing data movement. Our work developed communication lower bounds, and/or communication avoiding algorithms (that either meet the lower bound, or do much less communication than their conventional counterparts) for a variety of algorithms, including linear algebra, machine learning and genomics. The Berkeley part of the project concentrated on communication-optimal code generation to optimize speed and energy efficiency by reducing data movement. Our work developed communication lower bounds, and/or communication avoiding algorithms (that either meet the lower bound, or do much less communication than their conventional counterparts) for a variety of algorithms, including linear algebra, machine learning and genomics.

  18. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  19. [Disembedding and remoralization. Old age security and intergenerational relations in globalized welfare capitalism].

    Science.gov (United States)

    Leisering, L

    2002-08-01

    The article reconstructs the changes in provision for old age since the 19th century with regard to the ensuing change in intergenerational relationships. The first finding is a broadening of the arenas of provision for old age, a historical cumulation of family (which is still relevant), welfare state and, increasingly, private provision in financial markets, adding up to a 'welfare mix' in old age. This implies a complexification of intergenerational relationships. The second finding is an ambivalent qualitative change: on the one hand relationships between generations become more anonymous and disembedded from primary social relationships; on the other hand they are politicized (they become a public issue) and remoralized. This ambivalence applies to bureaucratic provision for old age in the welfare state, i.e., to social insurance. The main thesis is that--contrary to neoliberal belief--private old-age security in global financial markets cannot be seen as individualistic and moral-free but constitutes an anonymous exchange relationship between generations on financial markets that also raises issues of intergenerational justice. We can expect that these abstract relationships between generations will be politicized and remoralized as a consequence. Welfare state and financial markets offer solutions to problems of previous forms of provision for old age but they also produce new problems of intergenerational relationships.

  20. Preparing Information Systems (IS) Graduates to Meet the Challenges of Global IT Security: Some Suggestions

    Science.gov (United States)

    Sauls, Jeff; Gudigantala, Naveen

    2013-01-01

    Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  2. Strengthening Safety Culture as an Overriding Priority, in Achieving Global Nuclear Security Approach

    International Nuclear Information System (INIS)

    Kolundzija, V.

    2006-01-01

    In the IAEA glossary safety culture is defined as the assembly of characteristics and attitudes in organizations and individuals, which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance. It has been observed that a safety culture, as a part of both security and safety, possesses a few obstacles that should be noticed: safety culture cannot be directly regulated; variation in national cultures means that what constitutes as a good approach to enhancing safety culture in one country may not be the best approach in another. Three stages have been identified in developing and strengthening safety culture: 1 A technical issue (rules and regulations)/ first stage 2 Good safety performance (primarily in terms of safety targets or goals)/ second stage 3 A continuing process of improvement to which everyone can contribute/ third stage There are several key issues in safety culture, such as: a commitment, use of procedures, a conservative decision making (STAR) a reporting culture. Organizations and individuals should have attention on these. Overall common goals are to achieve and maintain a high level of safety and security of radioactive sources as well as facilities. Measures that are concerned on safeguards restrict access to the radioactive sources, conditioning and/or recycling of sources, and systems for detection the passage of the radioactive sources at strategic points, have gained main support. The main partners in implementation these measures are: IAEA, USA, Russian Federation, G8- Global Partnership, and European Union The member states of the IAEA have at their disposal internationally agreed standards. Current differences in applying standards in the IAEA member states are mainly related to state preparedness to cope with demands. Developing and less developed countries with small and medium nuclear programmes have difficulties to accept rules and regulations, to establish

  3. Impacts of ozone-vegetation coupling and feedbacks on global air quality, ecosystems and food security

    Science.gov (United States)

    Tai, A. P. K.

    2016-12-01

    Surface ozone is an air pollutant of significant concerns due to its harmful effects on human health, vegetation and crop productivity. Chronic ozone exposure is shown to reduce photosynthesis and interfere with gas exchange in plants, thereby influencing surface energy balance and biogeochemical fluxes with important ramifications for climate and atmospheric composition, including possible feedbacks onto ozone itself that are not well understood. Ozone damage on crops has been well documented, but a mechanistic understanding is not well established. Here we present several results pertaining to the effects of ozone-vegetation coupling on air quality, ecosystems and agriculture. Using the Community Earth System Model (CESM), we find that inclusion of ozone damage on plants reduces the global land carbon sink by up to 5%, while simulated ozone is enhanced by up to 6 ppbv North America, Europe and East Asia. This strong positive feedback on ozone air quality via ozone-vegetation coupling arises mainly from reduced stomatal conductance, which induces two feedback pathways: 1) reduced dry deposition and ozone uptake; and 2) reduced evapotranspiration that enhances vegetation temperature and thus isoprene emission. Using the same ozone-vegetation scheme in a crop model within CESM, we further examine the impacts of historical ozone exposure on global crop production. We contrast our model results with a separate statistical analysis designed to characterize the spatial variability of crop-ozone-temperature relationships and account for the confounding effect of ozone-temperature covariation, using multidecadal global datasets of crop yields, agroclimatic variables and ozone exposures. We find that several crops (especially C4 crops such as maize) exhibit stronger sensitivities to ozone than found by field studies or in CESM simulations. We also find a strong anticorrelation between crop sensitivities and average ozone levels, reflecting biological adaptive ozone

  4. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  5. Nigeria; Publication of Financial Sector Assessment Program Documentation––Detailed Assessment of Implementation of IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2013-01-01

    An assessment of the level of implementation of the International Organization of Securities Commissions (IOSCO) Principles in Nigeria was conducted as part of the International Monetary Fund (IMF)-World Bank Financial Sector Assessment Program (FSAP). The ongoing global financial crisis has reinforced the need for assessors to make a judgment about supervisory practices and to determine whether they are sufficiently effective. The assessment methodology provides a set of assessment criteria ...

  6. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  7. Safeguard and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support U.S. nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  8. Safeguards and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support US nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  9. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  10. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  11. Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs

    OpenAIRE

    Natarajan Meghanathan

    2013-01-01

    The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

  12. A two-factor, stochastic programming model of Danish mortgage-backed securities

    DEFF Research Database (Denmark)

    Nielsen, Søren S.; Poulsen, Rolf

    2004-01-01

    -trivial, both in terms of deciding on an initial mortgage, and in terms of managing (rebalancing) it optimally.We propose a two-factor, arbitrage-free interest-rate model, calibrated to observable security prices, and implement on top of it a multi-stage, stochastic optimization program with the purpose...

  13. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  14. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  15. AspectKE*:Security Aspects with Program Analysis for Distributed Systems

    DEFF Research Database (Denmark)

    2010-01-01

    AspectKE* is the first distributed AOP language based on a tuple space system. It is designed to enforce security policies to applications containing untrusted processes. One of the key features is the high-level predicates that extract results of static program analysis. These predicates provide...

  16. US Global Change Research Program Distributed Cost Budget Interagency Funds Transfer from DOE to NSF

    Energy Technology Data Exchange (ETDEWEB)

    Uhle, Maria [National Science Foundation (NSF), Washington, DC (United States)

    2016-09-22

    These funds were transferred from DOE to NSF as DOE's contribution to the U.S. Global Change Research Program in support of 4 internationalnactivities/programs as approved by the U.S. Global Change Research Program on 14 March 2014. The programs are the International Geosphere-Biosphere Programme, the DIVERSITAS programme, and the World Climate Research Program. All program awards ended as of 09-23-2015.

  17. The Sustainable Development Goals and the Global Health Security Agenda: exploring synergies for a sustainable and resilient world.

    Science.gov (United States)

    Bali, Sulzhan; Taaffe, Jessica

    2017-05-01

    Both the Sustainable Development Goals (SDGs) and the Global Health Security Agenda (GHSA) represent bold initiatives to address systematically gaps in previous efforts to assure that societies can be resilient when confronted with potentially overwhelming threats to health. Despite their obvious differences, and differing criticisms of both, they shift away from vertical (problem- or disease-specific) to horizontal (comprehensive) solutions. Despite the comprehensiveness of the SDGs, they lack a specific target for global health security. The GHSA focuses primarily on infectious diseases and neglects non-communicable diseases and socioeconomic drivers of health. Even though each agenda has limitations and unique challenges, they are complementary. We discuss ways to understand and implement the two agendas synergistically to hasten progress toward a more sustainable and resilient world.

  18. The carbon-sequestration potential of a global afforestation program

    International Nuclear Information System (INIS)

    Nilsson, S.; Schopfhauser, W.

    1995-01-01

    The authors analyzed the changes in the carbon cycle that could be achieved with a global large-scale afforestation program that is economically, politically and technically feasible. They estimated that of the areas regarded as suitable for large-scale plantations, only about 345 million ha would actually be available for plantations and agroforestry for the sole purpose of sequestering carbon. The maximum annual rate of carbon fixation (1.48 Gt/yr) would only be achieved 60 years after the establishment of the plantation - 1.14 Gt by above-ground biomass and 0.34 Gt by below-ground biomass. Over the periods from 1995 to 2095, a total of 104 Gt of carbon would be sequestered. This is substantially lower than the amount of carbon required to offset current carbon emissions (3.8 Gt/yr) in order to stabilize the carbon content of the atmosphere. 108 refs., 1 fig., 14 tabs

  19. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  20. Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis

    OpenAIRE

    Princely Ifinedo

    2015-01-01

    Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and controls in the financial services industry. Essentially, it seeks to enrich the information provide...

  1. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  2. The Role of Divine Revelation and Religious Teachings in Human Rights System: Security and Global Peace

    Directory of Open Access Journals (Sweden)

    Mahmoud Ghayyoum Zadeh

    2009-03-01

    Full Text Available Peace and security have always been considered as one of man’s concerns. The basis of peace and security should be sought in the theoretical foundations. However, the drafters of universal human rights have struggled to attain peace and security away from religious principles. The present article intends to introduce universal human rights in the light of religious teachings and elaborate on the related religious principles. It also deals with the distinctions between the principles governing the present world with regard to human rights and religious principles to show that if religious principles are seriously followed in the international relations, they will bring about perpetual peace and security for mankind. Therefore, Religion has a unique role in peace and security.

  3. GLOBAL CHANGE RESEARCH NEWS #8: OUR CHANGING PLANET: THE FY2000 U.S. GLOBAL CHANGE RESEARCH PROGRAM

    Science.gov (United States)

    This edition of Global Change Research News focuses on the publication of the new OurChanging Planet: The FY2000 U.S. Global Change Research Program. This annual report to the Congress was prepared under the auspices ofthe President's National Science and Technology Council. It...

  4. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  5. Security management internship program: a great recruiting tool for your company.

    Science.gov (United States)

    Yaross, Dan; Morris, Ronald J

    2013-01-01

    A well thought out and managed internship program is easily a "win-win" situation, according to the authors, who established such a program for the security department of their hospital. The program benefits not only the students with gaining practical experience of the business environment, but also the colleges/universities in coordinating internship opportunities for its students and business organizations in a number of ways including the possible identification of potential young career candidates to augment their current workforces. The article is based on the authors' presentation at the ASIS International Annual Seminar in September 2012.

  6. Enhancing Global Competitiveness through Experiential Learning: Insights into Successful Programming

    Science.gov (United States)

    Ghose, Nabarun

    2010-01-01

    International exposure of students is very essential in today's globalized world. Experiential learning, such as study abroad, plays a major role in developing global competencies in students, making them more marketable globally. This paper highlights one experiential activity that injects global competencies in students, thereby making them more…

  7. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  8. Creating and Implementing an Offshore Graduate Program: A Case Study of Leadership and Development of the Global Executive MBA Program

    Science.gov (United States)

    Herrera, Marisa L.

    2013-01-01

    This study applies the literature on leadership framing to the globalization of higher education to understand the development of the Global Executive MBA program at a large university. The purpose of the study was to provide administrators, educators and university leaders an understanding as to how to respond to globalization and, secondly, to…

  9. Community-Based Global Health Program for Maltreated Children and Adolescents in Brazil: The Equilibrium Program.

    Science.gov (United States)

    Marques, Andrea Horvath; Oliveira, Paula Approbato; Scomparini, Luciana Burim; Silva, Uiara Maria Rêgo E; Silva, Angelica Cristine; Doretto, Victoria; de Medeiros Filho, Mauro Victor; Scivoletto, Sandra

    2015-01-01

    The maltreatment of children and adolescents is a global public health problem that affects high- and low-middle income countries ("LMICs"). In the United States, around 1.2 million children suffer from abuse, while in LMICs, such as Brazil, these rates are much higher (an estimated 28 million children). Exposition to early environmental stress has been associated with suboptimal physical and brain development, persistent cognitive impairment, and behavioral problems. Studies have reported that children exposed to maltreatment are at high risk of behavioral problems, learning disabilities, communication and psychiatric disorders, and general clinical conditions, such as obesity and systemic inflammation later in life. The aim of this paper is to describe The Equilibrium Program ("TEP"), a community-based global health program implemented in São Paulo, Brazil to serve traumatized and neglected children and adolescents. We will describe and discuss TEP's implementation, highlighting its innovation aspects, research projects developed within the program as well as its population profile. Finally, we will discuss TEP's social impact, challenges, and limitations. The program's goal is to promote the social and family reintegration of maltreated children and adolescents through an interdisciplinary intervention program that provides multi-dimensional bio-psycho-social treatment integrated with the diverse services needed to meet the unique demands of this population. The program's cost effectiveness is being evaluated to support the development of more effective treatments and to expand similar programs in other areas of Brazil. Policy makers should encourage early evidence-based interventions for disadvantaged children to promote healthier psychosocial environments and provide them opportunities to become healthy and productive adults. This approach has already shown itself to be a cost-effective strategy to prevent disease and promote health.

  10. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael Conrad [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pshakin, Gennady [Obninsk Institute of Physics and Power Engineering (Russian Federation)

    2015-02-23

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  11. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    International Nuclear Information System (INIS)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad; Pshakin, Gennady

    2015-01-01

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  12. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    Energy Technology Data Exchange (ETDEWEB)

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  13. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  14. Towards an integrative post-2015 sustainable development goal framework: Focusing on global justice – peace, security and basic human rights

    Directory of Open Access Journals (Sweden)

    George R. Lueddeke

    2015-12-01

    To strengthen the likelihood of realizing the post-2015 Sustainable Development Goals (SDGs, particularly with regard to “planet and population” health and well-being , UN and other decision-makers are urged to consider the adoption of an integrated SDG framework that is based on (i a vision of global justice - underpinned by peace, security and basic human rights; (ii the development of interdependent and interconnected strategies for each of the eleven thematic indicators identified in the UN document The World We Want; and (iii the application of guiding principles to measure the impact of SDG strategies in terms of holism, equity, sustainability, ownership, and global obligation. While current discussions on the SDGs are making progress in a number of areas, the need for integration of these around a common global vision and purpose seems especially crucial to avoid MDG shortcomings.

  15. Lessons learned from the scaling-up of a weekly multimicronutrient supplementation program in the integrated food security program (PISA).

    Science.gov (United States)

    Lechtig, Aarón; Gross, Rainer; Vivanco, Oscar Aquino; Gross, Ursula; López de Romaña, Daniel

    2006-01-01

    Weekly multimicronutrient supplementation was initiated as an appropriate intervention to protect poor urban populations from anemia. To identify the lessons learned from the Integrated Food Security Program (Programa Integrado de Seguridad Alimentaria [PISA]) weekly multimicronutrient supplementation program implemented in poor urban populations of Chiclayo, Peru. Data were collected from a 12-week program in which multimicronutrient supplements were provided weekly to women and adolescent girls 12 through 44 years of age and children under 5 years of age. A baseline survey was first conducted. Within the weekly multimicronutrient supplementation program, information was collected on supplement distribution, compliance, biological effectiveness, and cost. Supplementation, fortification, and dietary strategies can be integrated synergistically within a micronutrient intervention program. To ensure high cost-effectiveness of a weekly multimicronutrient supplementation program, the following conditions need to be met: the program should be implemented twice a year for 4 months; the program should be simultaneously implemented at the household (micro), community (meso), and national (macro) levels; there should be governmental participation from health and other sectors; and there should be community and private sector participation. Weekly multimicronutrient supplementation programs are cost effective options in urban areas with populations at low risk of energy deficiency and high risk of micronutrient deficiencies.

  16. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  17. The U.S. Role in Global Security: The Mayo Clinic, Not the Emergency Room

    National Research Council Canada - National Science Library

    Hillen, John

    1998-01-01

    While many different proposals have been put forward outlining a post-Cold War security identity for the United States, most do not characterize an American role in terms of either excessive activism...

  18. Enhancing food security through a multi-stakeholder process: the global agenda for sustainable livestock

    NARCIS (Netherlands)

    Breeman, G.E.; Dijkman, J.; Termeer, C.J.A.M.

    2015-01-01

    Feeding the world is not only a complex technical matter, but also a demanding governance issue. As food security has all the characteristics of a wicked problem (variety of problem definitions, conflicting interests, interconnectedness across scales, inherent uncertainties), conventional governance

  19. AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps

    OpenAIRE

    Chen, Sen; Meng, Guozhu; Su, Ting; Fan, Lingling; Xue, Yinxing; Liu, Yang; Xu, Lihua; Xue, Minhui; Li, Bo; Hao, Shuang

    2018-01-01

    Contemporary financial technology (FinTech) that enables cashless mobile payment has been widely adopted by financial institutions, such as banks, due to its convenience and efficiency. However, FinTech has also made massive and dynamic transactions susceptible to security risks. Given large financial losses caused by such vulnerabilities, regulatory technology (RegTech) has been developed, but more comprehensive security risk assessment is specifically desired to develop robust, scalable, an...

  20. Initiating Joint Chinese-U.S. Activities on Biological Safety and Global Health Security

    OpenAIRE

    Center on Contemporary Conflict

    2014-01-01

    Performer: National Academy of Sciences (NAS) Principal Investigator: Benjamin J. Rusek Cost: $125,000 Fiscal Year(s): 2014-2015 China is critically important to international health and biological security efforts, yet awareness and implementation of biosafety and biosecurity practices are inconsistent among life science researchers and others working with pathogens and dual-use biotechnology in China. In late 2012, the Committee on International Security and Arms ...

  1. The Comprehensive Approach to Assessing the Economic Security of the Industry Sector in Conditions of Globalization

    Directory of Open Access Journals (Sweden)

    Denysov Oleg Ye.

    2018-01-01

    Full Text Available The author carries out an empirical study of the level of economic security of the chemical industry sector of Ukraine in the direction of «production of polyvinyl chlorides». For this purpose the integral index of economic security has been calculated according to the model of functional-component blocks of economic security of sector, developed by the author. Application of this model allowed to research the algorithm of action of the model on the factual basis and to analyze the obtained indicators. This, in turn, made possible to draw a conclusion about the constructiveness and expediency of application of the model of basic functional-component blocks for calculating the level of economic security of the industry sector. With the help of this approach, with application of the complex, system-structural, dynamic and functional approaches, the level of economic security has been defined and the process of monitoring the status and level of economic security of the industry sector has been ensured.

  2. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  3. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  4. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  5. Mobile geonet: Anywhere, global and secure access to your geographic oriented information

    International Nuclear Information System (INIS)

    Denizot, Laurent

    2001-01-01

    Today, the mobile technology has set up devices and communication architectures which change the way to work and improve efficiency and interactivity. EADS Matra Systems and Information is involved into these changes and develops a generic technology, mobile geonet, which brings these new means to improve the link between people who works together. Mobile geonet is a framework to develop mobile applications with a high security level and geographic capabilities. It is based on fully networked technologies (intranet/extranet/internet). It uses common mobile devices, enhanced by localisation and communication add-ons, like GPS, GSM or satellite phones modules. All the information processed and produced by upstream activities is stored in the DB GEO database system. These can be reports, maps, satellite images, structured information, points of interest and anything else with an potential geographic component. The role of the ASP (Application Service Provider) is to integrate existing applications or provide new ones. These applications are activated whether server-side, to mine, prepare and encode data or client-side to decode, present or interact in particular means with the user. The applications and data are disseminated through an extranet server. A particular interest of distributing the client applications by the ASP is the deployment cost on all mobile and fixed terminals, which is very small, because it is automatically downloaded for each upgrade. The communication layer aims at delivering applications up to the mobile device and permits the data exchange between the mobile device and the central data repository. Different means can be used: GSM network, internet or satellite communications. The applications are adapted to the available bandwidth, especially when image parts are downloaded. The mobile device is chosen on the shelf, depending of the requirements of the application. The computer can be a very small Pocket PC or a typical portable PC. For

  6. Community-Based Global Health Program for Maltreated Children and Adolescents in Brazil: The Equilibrium Program

    Science.gov (United States)

    Marques, Andrea Horvath; Oliveira, Paula Approbato; Scomparini, Luciana Burim; Silva, Uiara Maria Rêgo e; Silva, Angelica Cristine; Doretto, Victoria; de Medeiros Filho, Mauro Victor; Scivoletto, Sandra

    2015-01-01

    The maltreatment of children and adolescents is a global public health problem that affects high- and low-middle income countries (“LMICs”). In the United States, around 1.2 million children suffer from abuse, while in LMICs, such as Brazil, these rates are much higher (an estimated 28 million children). Exposition to early environmental stress has been associated with suboptimal physical and brain development, persistent cognitive impairment, and behavioral problems. Studies have reported that children exposed to maltreatment are at high risk of behavioral problems, learning disabilities, communication and psychiatric disorders, and general clinical conditions, such as obesity and systemic inflammation later in life. The aim of this paper is to describe The Equilibrium Program (“TEP”), a community-based global health program implemented in São Paulo, Brazil to serve traumatized and neglected children and adolescents. We will describe and discuss TEP’s implementation, highlighting its innovation aspects, research projects developed within the program as well as its population profile. Finally, we will discuss TEP’s social impact, challenges, and limitations. The program’s goal is to promote the social and family reintegration of maltreated children and adolescents through an interdisciplinary intervention program that provides multi-dimensional bio-psycho-social treatment integrated with the diverse services needed to meet the unique demands of this population. The program’s cost effectiveness is being evaluated to support the development of more effective treatments and to expand similar programs in other areas of Brazil. Policy makers should encourage early evidence-based interventions for disadvantaged children to promote healthier psychosocial environments and provide them opportunities to become healthy and productive adults. This approach has already shown itself to be a cost-effective strategy to prevent disease and promote health. PMID

  7. Nuclear power and the global challenges of energy security, 6 September 2007, London, England, World Nuclear Association Annual Symposium

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    In the Atoms for Peace speech given by US President Eisenhower in 1953 - the speech that paved the way for the creation of the IAEA - he declared that a special purpose of Atoms for Peace would be 'to provide abundant electrical energy in the power-starved areas of the world'. That vision has yet to be realized. And it should not be taken to mean that nuclear power is the solution for all countries, or for all developing countries. But I would reiterate what I said at the outset - that the global challenges of security and development are interlinked, and that addressing the energy security needs of all countries will be a key to progress on both fronts. It is incumbent upon us to see to it that nuclear power will fulfil its potential in addressing these challenges

  8. An obsolete dichotomy? Rethinking the rural–urban interface in terms of food security and production in the global south.

    Science.gov (United States)

    Lerner, Amy M; Eakin, Hallie

    2011-01-01

    The global food system is coming under increasing strain in the face of urban population growth. The recent spike in global food prices (2007–08) provoked consumer protests, and raised questions about food sovereignty and how and where food will be produced. Concurrently, for the first time in history the majority of the global population is urban, with the bulk of urban growth occurring in smaller-tiered cities and urban peripheries, or ‘peri-urban’ areas of the developing world. This paper discusses the new emerging spaces that incorporate a mosaic of urban and rural worlds, and reviews the implications of these spaces for livelihoods and food security. We propose a modified livelihoods framework to evaluate the contexts in which food production persists within broader processes of landscape and livelihood transformation in peri-urban locations. Where and how food production persists are central questions for the future of food security in an urbanising world. Our proposed framework provides directions for future research and highlights the role of policy and planning in reconciling food production with urban growth.

  9. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  10. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and Transformation of Infectious Disease Control System in South Korea.

    Science.gov (United States)

    Choi, Eun Kyung; Lee, Jong-Koo

    2016-12-01

    This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH) was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC) was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in disease control. The

  11. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and Transformation of Infectious Disease Control System in South Korea

    Directory of Open Access Journals (Sweden)

    Eun Kyung CHOI

    2016-12-01

    Full Text Available This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in

  12. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  13. Global Climate Change, Food Security and the U.S. Food System

    Science.gov (United States)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.

  14. Measuring household food security: the global experience A medida da segurança alimentar: a experiência mundial

    Directory of Open Access Journals (Sweden)

    Hugo Melgar-Quinonez

    2008-08-01

    Full Text Available Measuring household food insecurity represents a challenge due to the complexity and wide array of factors associated with this phenomenon. For over one decade, researchers and agencies throughout the world have been using and assessing the validity of variations of the United States Department of Agriculture Household Food Security Supplemental Module. Thanks to numerous studies of diverse design, size, and purpose, the Household Food Security Supplemental Module has shown its suitability to directly evaluate the perceptions of individuals on their food security status. In addition, challenges and limitations are becoming clearer and new research questions are emerging as the process advances. The purpose of this article is to describe the development, validation procedures, and use of the Household Food Security Supplemental Module in very diverse settings. The most common Household Food Security Supplemental Module related studies have been conducted using criterion validity, Rasch modeling and Cronbach-Alpha Coefficient. It is critical that researchers, policy makers, governmental and non-governmental agencies intensify their efforts to further develop tools that provide valid and reliable measures of food security in diverse population groups. Additional work is needed to synthesize a universally applicable tool able to capture the global human phenomenon of food insecurity.Medir a insegurança alimentar domiciliar representa um desafio devido à complexidade e ao vasto número de fatores associados a este fenômeno. Por mais de uma década, pesquisadores e agências em todo o mundo têm usado o Módulo Suplementar da Segurança Alimentar Domiciliar , do Departamento de Agricultura dos Estados Unidos (Household Food Security Supplemental Module, e avaliado suas variações. Graças a numerosos estudos com diversos formatos, extensões e propósitos, a adequação do Household Food Security Supplemental Module para avaliar diretamente a

  15. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  16. A stochastic security approach to energy and spinning reserve scheduling considering demand response program

    International Nuclear Information System (INIS)

    Partovi, Farzad; Nikzad, Mehdi; Mozafari, Babak; Ranjbar, Ali Mohamad

    2011-01-01

    In this paper a new algorithm for allocating energy and determining the optimum amount of network active power reserve capacity and the share of generating units and demand side contribution in providing reserve capacity requirements for day-ahead market is presented. In the proposed method, the optimum amount of reserve requirement is determined based on network security set by operator. In this regard, Expected Load Not Supplied (ELNS) is used to evaluate system security in each hour. The proposed method has been implemented over the IEEE 24-bus test system and the results are compared with a deterministic security approach, which considers certain and fixed amount of reserve capacity in each hour. This comparison is done from economic and technical points of view. The promising results show the effectiveness of the proposed model which is formulated as mixed integer linear programming (MILP) and solved by GAMS software. -- Highlights: → Determination of optimal spinning reserve capacity requirement in order to satisfy desired security level set by system operator based on stochastic approach. → Scheduling energy and spinning reserve markets simultaneously. → Comparing the stochastic approach with deterministic approach to determine the advantages and disadvantages of each. → Examine the effect of demand response participation in reserve market to provide spinning reserve.

  17. Stacking The Deck - Can We Better Develop Future Homeland Security Leaders With Formal Mentoring Programs?

    Science.gov (United States)

    2014-09-01

    integrity, trustworthy , strong work ethic, critical thinker, etc.), and a willing program participant with high expectations.73 Desired...interpersonal skills  Trustworthy , honest, and flexible  “A forward, global thinker who is available and has the Department’s and the mentee’s best...Employees . Mentoring Employees . Celebrating Accomplishments Explain the importance of good communication skills . Communications iviodei

  18. WTO Compliance Status of the Conservation Security Program (CSP) and the Conservation Reserve Program (CRP)

    National Research Council Canada - National Science Library

    Schnepf, Randy

    2007-01-01

    .... This report is not a legal opinion, but describes both the CSP and CRP programs, the WTO Annex II provisions that govern compliance, and the potential issues involved in evaluating the compliance status of the two programs. This report will be updated as events warrant.

  19. The Multiplier Effect: The Case for Multi-School, Global Education Programs

    Science.gov (United States)

    Dugan, Rik; Nink, Matt

    2010-01-01

    Multi-school and multi-country programs greatly enhance leadership development and global awareness in students and teachers, while creating better problem solvers, stronger relationships, and wider community impact than any single-school program. That's why Global Youth Leadership Institute (GYLI) and National Association of Independent Schools…

  20. Research Suggestions in the Design of a Global Graduate Business Program Delivered by Online Learning

    Science.gov (United States)

    Puderbaugh, Amy

    2015-01-01

    The purpose of this paper was to examine the unique areas of concern when establishing an eLearning program in the field of global business. A survey of eLearning and a global management subject matter appears. This paper identifies potential challenges in program design and raises practical concerns for future research. [For the full proceedings,…

  1. Global Security in the Twenty First Century - The Challenge to International Organizations, Alliances and Coalitions

    National Research Council Canada - National Science Library

    Seymour, N

    1999-01-01

    ... for Security and Cooperation in Europe (OSCE) Naturally, it would be too simplistic for the answer to be either one or the other; the probable solution is more likely to be a hybrid that embodies the strengths of both, not to mention the UN.

  2. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Microphysical particles such as glass and metal can be hazardous and cause serious injury to consumers. Pathogenic bacteria, viruses and toxins produced by microorganisms are all possible contaminants of food and impact food safety. Like food security, food safety is also effected by poverty and climate change. Hence Foo

  3. Global Security, Religion and Education Development: A Crisis for the Field of Comparative Education?

    Science.gov (United States)

    Sayed, Yusuf; Davies, Lynn; Hardy, Mike; Arani, Abbas Madandar; Kakia, Lida; Bano, Masooda

    2011-01-01

    The above title was suggested by the editors of this journal as being an interesting topic for a forum. It is indeed a valuable one to explore, in that while there has been extensive writing on various connections between security, religion and education (e.g. Apple 2004; Griffin 2006; Merry 2007; Davies 2008), situating this within comparative…

  4. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  5. The global security perspective on the effects of executive cognitive function on complex behavioral screening intervention and HIV/AIDS.

    Science.gov (United States)

    Kim, Suk-Hee

    2010-11-01

    The purpose of this quantitative study is to understand the global security perspective on the effects of executive cognitive function (ECF) on Complex Behavioral Screening Intervention and HIV/AIDS. The HIV/AIDS pandemic is as much a social, political, economic, and cultural problem as a biomedical one. HIV/AIDS is associated centrally with the collapse not just of communities and families but potentially of states, with some of the largest public health interventions ever and enormous questions about governance, a huge population of orphans, and deep questions about intergenerational relations and cultural transmission. This study also is to develop a screening instrument that improves quality of life for individuals with executive cognitive impairments and behavior problems in our communities and the global society.

  6. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  7. Teaching corner: child family health international : the ethics of asset-based global health education programs.

    Science.gov (United States)

    Evert, Jessica

    2015-03-01

    Child Family Health International (CFHI) is a U.S.-based nonprofit, nongovernmental organization (NGO) that has more than 25 global health education programs in seven countries annually serving more than 600 interprofessional undergraduate, graduate, and postgraduate participants in programs geared toward individual students and university partners. Recognized by Special Consultative Status with the United Nations Economic and Social Council (ECOSOC), CFHI utilizes an asset-based community engagement model to ensure that CFHI's programs challenge, rather than reinforce, historical power imbalances between the "Global North" and "Global South." CFHI's programs are predicated on ethical principles including reciprocity, sustainability, humility, transparency, nonmaleficence, respect for persons, and social justice.

  8. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  9. Enabling socio-economic activities: Opening global markets for the marginalized through secure ICT use

    CSIR Research Space (South Africa)

    Phahlamohlaka, Jackie

    2016-08-01

    Full Text Available This paper identifies and describes five economic activities through which ICT could effectively be used to open global markets for rural and marginalized communities. The activities are identified in contexts where there are no industries...

  10. Report of the Defense Science Board Task Force on Globalization and Security

    National Research Council Canada - National Science Library

    Hicks, Donald

    1999-01-01

    Globalization-the integration of the political, economic and cultural activities of geographically and/or nationally separated peoples-is not a discernible event or challenge, is not new, but it is...

  11. Securing a sustainable future through a new global contract between rich and poor

    CSIR Research Space (South Africa)

    De Lange, Willem J

    2009-01-01

    Full Text Available Global sustainable development depends on the capacity of natural, social and economic systems to adapt to external stimuli. However, building this adaptive capacity in the developing world context of Sub-Sahara Africa will require substantial...

  12. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  13. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  14. Cost of the Cervical Cancer Screening Program at the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Víctor Granados-García

    2014-09-01

    Full Text Available Objective. To estimate the annual cost of the National Cervical Cancer Screening Program (CCSP of the Mexican Institute of Social Security (IMSS. Materials and methods. This cost analysis examined regional coverage rates reported by IMSS. We estimated the number of cytology, colposcopy, biopsy and pathology evaluations, as well as the diagnostic test and treatment costs for cervical intraepithelial neoplasia grade II and III (CIN 2/3 and cervical cancer. Diagnostic test costs were estimated using a micro-costing technique. Sensitivity analyses were performed. Results. The cost to perform 2.7 million cytology tests was nearly 38 million dollars, which represents 26.1% of the total program cost (145.4 million. False negatives account for nearly 43% of the program costs. Conclusion. The low sensitivity of the cytology test generates high rates of false negatives, which results in high institutional costs from the treatment of undetected cervical cancer cases.

  15. Investigating Food and Agribusiness Corporations as Global Water Security, Management and Governance Agents: The case of Nestlé, Bunge and Cargill

    Directory of Open Access Journals (Sweden)

    Suvi Sojamo

    2012-10-01

    Full Text Available This article investigates the agency of the world’s largest food and agribusiness corporations in global water security via case studies of Nestlé, Bunge and Cargill by analysing their position in the political economy of the world agro-food system and the ways they intentionally and non-intentionally manage and govern water in their value chains and wider networks of influence. The concentrated power of a few corporations in global agro-food value chains and their ability to influence the agro-food market dynamics and networks throughout the world pose asymmetric conditions for reaching not only global food security but also water security. The article will analyse the different forms of power exercised by the corporations in focus in relation to global water security and the emerging transnational water governance regime, and the extent to which their value chain position and stakeholder interaction reflect or drive their actions. Due to their vast infrastructural and technological capacity and major role in the global agro-food political economy, food and agribusiness corporations cannot avoid increasingly engaging, for endogenous and exogenous reasons, in multi-stakeholder initiatives and partnerships to devise methods of managing the agro-food value chains and markets to promote global water security. However, their asymmetric position in relation to their stakeholders demands continuous scrutiny.

  16. Sovereignty and Nuclear Weapons: The Need for Real Sovereign Authority Rooted in the People’s Global Expectations about Survival, Peace and Security

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-10-01

    Full Text Available The current international security framework is based on an incomplete, anachronistic conception of sovereignty shaped largely by historical circumstance rather than principles of universal justice. Evolution of the global community over the past half century necessitates a reformulation of the concept to justly represent the rights of individual citizens and the global community as a whole. The reconceptualization of sovereignty is an essential condition for the elimination of major threats to global security, most especially those arising from the continued existence and proliferation of nuclear weapons and other weapons of mass destruction.

  17. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    Science.gov (United States)

    Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201

  18. Global renewable energy-based electricity generation and smart grid system for energy security.

    Science.gov (United States)

    Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  19. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    Directory of Open Access Journals (Sweden)

    M. A. Islam

    2014-01-01

    Full Text Available Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  20. Enhancing global health and education in Malawi, Zambia, and the United States through an interprofessional global health exchange program.

    Science.gov (United States)

    Wilson, Lynda Law; Somerall, D'Ann; Theus, Lisa; Rankin, Sally; Ngoma, Catherine; Chimwaza, Angela

    2014-05-01

    This article describes participant outcomes of an interprofessional collaboration between health professionals and faculty in Malawi, Zambia, and the United States (US). One strategy critical for improving global health and addressing Millennium Development goals is promotion of interprofessional education and collaboration. Program participants included 25 health professionals from Malawi and Zambia, and 19 faculty/health professionals from Alabama and California. African Fellows participated in a 2 week workshop on Interprofessional Education in Alabama followed by 2 weeks working on individual goals with faculty collaborators/mentors. The US Fellows also spent 2 weeks visiting their counterparts in Malawi and Zambia to develop plans for sustainable partnerships. Program evaluations demonstrated participants' satisfaction with the program and indicated that the program promoted interprofessional and cross-cultural understanding; fostered development of long-term sustainable partnerships between health professionals and educators in Zambia and the US; and created increased awareness and use of resources for global health education. © 2014.

  1. Security programs for Category I or II nuclear material or certain nuclear facilities. Regulatory guide G-274

    International Nuclear Information System (INIS)

    2003-03-01

    The purpose of this regulatory guide is to help applicants for a Canadian Nuclear Safety Commission (CNSC) licence in respect of Category I or II nuclear material - other than a licence to transport - , or a nuclear facility consisting of a nuclear reactor that may exceed 10 MW thermal power during normal operation, prepare and submit the security information to be included with the application, pursuant to the Nuclear Safety and Control Act (NSCA). Category I and II nuclear material are defined in Appendix B to this guide. This guide describes: the security information that should typically be included with the application for any licence referred to above; how the security information may be organized and presented in a separate document (hereinafter 'the security program description'), in order to assist CNSC review and processing of the application; and, the administrative procedures to be followed when preparing, submitting or revising the security program description. (author)

  2. Research project of P3 (Protected Plutonium Production) and global academy for 3S (Safety, Security, Safeguard) for peace and sustainable prosperity

    International Nuclear Information System (INIS)

    Saito, Masaki

    2013-01-01

    Full text:Nuclear engineering education has been initiated in 1957 at the graduate school of Tokyo Institute of Technology. Higher Educational activities have been conducted for more than half century. More than 1000 Master students and 200 Doctoral students graduated from the Department of Nuclear Engineering in Tokyo Institute of Technology. Many of them are working in nuclear industries and institutes. International course of nuclear engineering was initiated in 1994, and 130 students from 20 overseas countries have graduated from Master and Doctoral Programs. In the national research program, Protected Plutonium Production (P 3 ) has been proposed to enhance the proliferation resistance of plutonium by the transmutation of Minor Actinides (MAs). In 2011, Academy for Global Nuclear Safety and Security Agent was initiated with the unique features of a full boarding system and a curriculum that combines education in liberal arts and science/ engineering. Both educational and research programs have been supported by the Ministry of Education, Culture, Sports, Science and Technology in Japan. In the conference, the current nuclear educational and research activities in Tokyo Institute of Technology will be presented. (author)

  3. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  4. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  5. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  6. 77 FR 5681 - Establishment of Global Entry Program

    Science.gov (United States)

    2012-02-06

    ...) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), 118 Stat. 3638, as amended... major airport authority printed its own signs for Global Entry and strategically placed them throughout...

  7. Globalization of water and food through international trade: impacts on food security, resilience and justice

    Science.gov (United States)

    D'Odorico, P.; Carr, J. A.; Seekell, D. A.; Suweis, S. S.

    2015-12-01

    The global distribution of water resources in general depends on geographic conditions but can be (virtually) modified by humans through mechanisms of globalization, such as trade, that make food commodities available to populations living far from the production regions. While trade is expected to improve access to food and (virtual) water, its impact on the global food system and its vulnerability to shocks remains poorly understood. It is also unclear who benefits from trade and whether it contributes to inequality and justice in resource redistribution. We reconstruct the global patterns of food trade and show with a simple model how the ongoing intensification of imports and exports has eroded the resilience of the global food system. Drawing on human rights theory, we investigate the relationship between inequality and injustice in access to water and food. We assess the fulfillment of positive and negative water and food rights and evaluate the obligations arising from the need to ensure that these rights are met throughout the world. We find that trade enhances the vulnerability to shocks but overall increase the number of people whose water and food rights are met.

  8. Department of energy defense programs perspectives on safeguards, security, and classification

    International Nuclear Information System (INIS)

    Eyck, E.Q.T.

    1989-01-01

    This paper discusses why national and international safeguards and the protection of sensitive information are important to the United States and to other nations. It demonstrates that while the opposite consequence appears logical these functions will probably become even more important if the major powers agree on further arms reductions. Some of the steps taken by the U.S. Department of Energy to improve the effectiveness of its safeguards, security, and classification programs are reviewed. The valuable contributions in these areas since 1968 and 1976, respectively by the Technical Support Organization and the International Safeguards Project Offoce at Brookhaven are noted

  9. Novel methods for Solving Economic Dispatch of Security-Constrained Unit Commitment Based on Linear Programming

    Science.gov (United States)

    Guo, Sangang

    2017-09-01

    There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.

  10. Individual capacity-building approaches in a global pharmaceutical systems strengthening program: a selected review.

    Science.gov (United States)

    Konduri, Niranjan; Rauscher, Megan; Wang, Shiou-Chu Judy; Malpica-Llanos, Tanya

    2017-01-01

    Medicines use related challenges such as inadequate adherence, high levels of antimicrobial resistance and preventable adverse drug reactions have underscored the need to incorporate pharmaceutical services to help achieve desired treatment outcomes, and protect patients from inappropriate use of medicines. This situation is further constrained by insufficient numbers of pharmaceutical personnel and inappropriate skill mix. Studies have addressed individual capacity building approaches of logistics, supply chain or disease specific interventions but few have documented those involving such pharmacy assistants/professionals, or health workers/professionals charged with improving access and provision of pharmaceutical services. We examined how different training modalities have been employed and adapted to meet country-specific context and needs by a global pharmaceutical systems strengthening program in collaboration with a country's Ministry of Health and local stakeholders. Structured, content analysis of training approaches from twelve selected countries and a survey among conveniently selected trainees in Bangladesh and Ethiopia. Case-based learning, practice and feedback, and repetitive interventions such as post-training action plan, supportive supervision and mentoring approaches are effective, evidence-based training techniques. In Ethiopia and Bangladesh, over 94% of respondents indicated that they have improved or developed skills or competencies as a result of the program's training activities. Supportive supervision structures and mentorship have been institutionalized with appropriate management structures. National authorities have been sensitized to secure funding from domestic resources or from the global fund grants for post-training follow-up initiatives. The Pharmaceutical Leadership Development Program is an effective, case-based training modality that motivates staff to develop quality-improvement interventions and solve specific challenges

  11. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Science.gov (United States)

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  12. Emerging middle powers and global security challenges: the case of Brazil and Turkey - implications for Portugal

    OpenAIRE

    Balla, Evanthia

    2012-01-01

    Today's global order fundamentally differs from the one of classic multipolarity, Cold War bipolarity or post Cold War unipolarity. There are many emerging powers and many no nation-states entities with powers. Yet, the world seems to slowly adjusting to these new realities.

  13. Towards global phosphorus security: A systems framework for phosphorus recovery and reuse options

    NARCIS (Netherlands)

    Cordell, D.; Rosemarin, A.; Schroder, J.J.; Smit, A.L.

    2011-01-01

    Human intervention in the global phosphorus cycle has mobilised nearly half a billion tonnes of the element from phosphate rock into the hydrosphere over the past half century. The resultant water pollution concerns have been the main driver for sustainable phosphorus use (including phosphorus

  14. Global Analysis, Interpretation and Modelling: An Earth Systems Modelling Program

    Science.gov (United States)

    Moore, Berrien, III; Sahagian, Dork

    1997-01-01

    The Goal of the GAIM is: To advance the study of the coupled dynamics of the Earth system using as tools both data and models; to develop a strategy for the rapid development, evaluation, and application of comprehensive prognostic models of the Global Biogeochemical Subsystem which could eventually be linked with models of the Physical-Climate Subsystem; to propose, promote, and facilitate experiments with existing models or by linking subcomponent models, especially those associated with IGBP Core Projects and with WCRP efforts. Such experiments would be focused upon resolving interface issues and questions associated with developing an understanding of the prognostic behavior of key processes; to clarify key scientific issues facing the development of Global Biogeochemical Models and the coupling of these models to General Circulation Models; to assist the Intergovernmental Panel on Climate Change (IPCC) process by conducting timely studies that focus upon elucidating important unresolved scientific issues associated with the changing biogeochemical cycles of the planet and upon the role of the biosphere in the physical-climate subsystem, particularly its role in the global hydrological cycle; and to advise the SC-IGBP on progress in developing comprehensive Global Biogeochemical Models and to maintain scientific liaison with the WCRP Steering Group on Global Climate Modelling.

  15. Global Political Aspects of Putin’s Speech at the 43-th Munich Security Conference. One Decade Past

    Directory of Open Access Journals (Sweden)

    Николай Петрович Пархитько

    2018-12-01

    Full Text Available In February 10th 2007 President of Russia V. Putin held a speech at the 43th Munich Security Conference. The speech included both the matters of security and global policy. Researchers in Russia together as well as their western colleagues (political scientists, journalists, historians and other analysts obviously came to the same opinion - that was the speech of the Russian president that attracted all the attention to this annual conference not being so traditionally popular as, for example, the “G-8” or the APEC summits. And though the estimations of the ideas advocated by Putin in his speech predictably differ depending on political creed and engagement of the analysts (sometimes that was also the matter of their erudition, the importance of the event was undisputable. Today one decade past the event we have the opportunity not just to analyze the crucial principles which Putin tried to clarify to his foreign partners, but also to verify them through the prism of approbation, as the scientists say. But before we start to study the speech itself, we should reveal the global political circumstances, in which the Conference took place. What was Russia as a global power in the beginning of the XXI century and was it a true global power in 2007? Was the political weight of the Russian president enough for bringing the influence into the world? Finally, what was the perceptions of Russia in the western community 15 years after the greatest transformation of the global political role of the country in Europe and in the world? After finding the answers on these questions we will reveal the main theses of the Russian presidents’ speech and will try to give them possibly candid estimation. In the work the authors used a wide methodological list. The historical-analytical method made it possible to reveal the evolution of the problems outlined in the speech of V.V. Putin for the specified time period (10 years. The comparative method allowed us

  16. (In)security factor atomic bomb. An analysis of the crisis with the Iranian nuclear program

    International Nuclear Information System (INIS)

    Bock, Andreas

    2012-04-01

    Iran is a rational actor in the international politics that decides on the basis of the perception of threat. Iran's security situation is comparable with that of Israel with the rational consequence to rely on the atomic program with respect to deterrence and self-defense. The solution of the Iran crisis is basically dependent on a change of the perception of threat. A military act against the Iranian nuclear facilities would be counterproductive, would only slowing down the program but not prevent further activities. In fact a military act would enhance the perception of threat. For the analysis of the Iran crises the author used the Cuba crisis as blueprint, were mislead perceptions were responsible for the escalation.

  17. Impact of lengthening open water season on food security in Alaska coastal communities: Global impacts may outweigh local "frontline" effects

    Science.gov (United States)

    Rolph, R.; Mahoney, A. R.

    2015-12-01

    Using ice concentration data from the Alaska Sea Ice Atlas from 1953-2013 for selected communities in Alaska, we find a consistent trend toward later freeze up and earlier breakup, leading a lengthened open water period. Such changes are often considered to bring a variety of "frontline" local impacts to Arctic coastal communities such as increased rates of coastal erosion. However, direct consequences of these changes to local food security (e.g. through impacts on subsistence activities and marine transport of goods) may be outweighed at least in the short term by the effects of large scale Arctic sea ice change coupled with global oil markets. For example, a later freeze-up might delay local hunters' transition from boats to snow-machines, but whether this trend will affect hunting success, especially in the next few years, is uncertain. Likewise, the magnitude of change in open water season length is unlikely to be sufficient to increase the frequency with which communities are served by barges. However, an expanding open water season throughout the Arctic has implications for the global economy, which can have indirect effects on local communities. In the Chukchi and Beaufort Seas, where rapid sea ice change has been accompanied by increased interest in oil and gas development, the U.S. Bureau of Ocean Energy Management currently requires drilling operations to cease 38 days prior to freeze up. Taking this into account, the lengthening open water season has effectively extended the drilling season for oil companies by 184% since the 1950s. If oil development goes ahead, local communities will likely experience a range of indirect impacts on food security due to increased vessel traffic and demand on infrastructure coupled with changes in local economies and employment opportunities. Increased likelihood of an oil spill in coastal waters also poses a significant threat to local food security. Thus, while Arctic coastal communities are already experiencing

  18. A City and National Metric measuring Isolation from the Global Market for Food Security Assessment

    Science.gov (United States)

    Brown, Molly E.; Silver, Kirk Coleman; Rajagopalan, Krishnan

    2013-01-01

    The World Bank has invested in infrastructure in developing countries for decades. This investment aims to reduce the isolation of markets, reducing both seasonality and variability in food availability and food prices. Here we combine city market price data, global distance to port, and country infrastructure data to create a new Isolation Index for countries and cities around the world. Our index quantifies the isolation of a city from the global market. We demonstrate that an index built at the country level can be applied at a sub-national level to quantify city isolation. In doing so, we offer policy makers with an alternative metric to assess food insecurity. We compare our isolation index with other indices and economic data found in the literature.We show that our Index measures economic isolation regardless of economic stability using correlation and analysis

  19. Global Partners : University of Saskatchewan Small Grant Program ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project builds on the experience of the University of Saskatchewan's Global ... Women in the developing world continue to face obstacles that limit their ability to ... of Canada (AUCC) to offer academics (graduate students, professors,. ... grants from IDRC to enhance its members' understanding of and engagement with.

  20. Climate Change Implications to the Global Security Environment, U.S. Interests, and Future Naval Operations

    Science.gov (United States)

    2011-03-14

    Central and South America . Reactive HA/DR, on the other hand is a crisis response operation which employs naval expeditionary capabilities to meet...have a wide spectrum of adverse effects on global health, particularly in developing nations. Increased rates and extended ranges of malaria, dengue ...scope of our response when the time comes. " Vice Admiral Richard Truly, Director, Department of Energy National Renewable En ~rgy Lab22 Climate Change

  1. IRSN 2007 barometer: perception of risks and security by French people. Global results

    International Nuclear Information System (INIS)

    2007-07-01

    This report presents under the form of graphs and comments the results of the annual IRSN opinion poll on matters of risk and security. The IRSN is the French Institute of Radioprotection and Nuclear Safety. Different themes are analysed: the present concerns for French people (in the present society, for the environment, about industrial risks and the image of science), the perception of expertise (who should control an installation, the role and the image of scientific experts, access to expertise documents), the public interest in risk issues (topic of interest, participation to information sessions), the attitude in front of 30 risk situations (presently perceived risks, confidence in public authorities to ensure their protection, truth about information on hazards, hierarchy of 30 situations). The last part is dedicated to the nuclear domain (nuclear risk, skill and credibility of interveners)

  2. Environmental degradation, population displacement and global security: An overview of the issues

    International Nuclear Information System (INIS)

    1992-12-01

    An initial investigation is presented on the interrelationship between environmental degradation and population displacements, in the broader context of how this linkage affects human security. Emphasis is placed on both the causes and effects of population movements, with specific examples drawn from Southeast Asia. Types of migrants, the importance of environmental degradation with respect to other contributing factors, and the effects on origin and destination regions are considered. A key issue is the multi-causality of population displacements and the importance of improving understanding of the issues in order to develop appropriate policies. It is clear from the study that the discussion of environment as a cause or contributing factor to population displacement has, to date, been speculative, and the information provided largely anecdotal. 58 refs., 1 fig., 3 tabs

  3. Energy policymaking in Denmark: Implications for global energy security and sustainability

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.

    2013-01-01

    Denmark is arguably the most energy secure and sustainable country in the Organization of Economic Cooperation and Development (OECD). The country has reduced its dependence on foreign sources of energy to zero and become self-sufficient in its own energy production and use, offering important lessons for other nations around the world. This study explores the core of Denmark's successful approach: a commitment to energy efficiency, prolonged taxes on energy fuels, electricity, and carbon dioxide, and incentives for combined heat and power (CHP) and wind turbines. Through these commitments, the study shows how Denmark transitioned from being almost 100 percent dependent on imported fuels such as oil and coal for their power plants in 1970 to becoming a net exporter of fuels and electricity today. The country leads the world in terms of exportation of wind energy technology, with a hold on roughly one-third of the world market for wind turbines. It was able to phase out the use of virtually all oil-fired power plants in less than five years and implemented a progressive moratorium on future coal-fired power plants in the 1990s. Their most recent strategy seeks to achieve 30 percent of total energy supply from renewable energy by 2025. - Highlights: • Denmark is arguably the most energy secure and sustainable country in the OECD. • This study explores the core of Denmark's successful approach. • Denmark phased out oil-fired power plants in less than five years. • It also implemented a progressive moratorium on coal-fired power plants

  4. Global security: The need for a new beginning, 12 October 2007, New Delhi, Hindustan Times Leadership Summit

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2007-01-01

    The search for security remains the overriding concern for many peoples and nations. But the definition of what constitutes security, and the strategies for attaining it, vary greatly. For billions of people, the quest is to 'secure' basic needs: food, water, shelter and health care - in other words, freedom from want. For others, it is to 'secure' other fundamental human rights: freedom of expression, freedom from oppression, freedom from fear. Even among States, security has different definitions. For some, it is the achievement of economic or military parity or superiority, for others the projection of power and influence, and for still others the resolution of grievances and disputes. If we look at the quest to secure basic needs, we are struck by the persistent inequity in the global distribution of wealth. If we look at the quest for other fundamental human rights, the picture is also grim in many regions, with problems ranging from religious intolerance and the lack of political freedom to systematic oppression and torture. Perhaps the most severe critique of our global progress in this area is reflected in our uneven approach to the sanctity of human life. If we look at the security of nation-States, our record is also poor, particularly as reflected in regional conflicts that have been allowed to fester for decades. The effort to curtail nuclear threats is still a work in progress. Consider the events of just the past few years. The war in Iraq over suspicions that nuclear and other weapons programmes had been revived. North Korea's withdrawal from the NPT and subsequent test of a nuclear weapon. Libya's relinquishment of a fledgling nuclear weapons programme. The discovery of A. Q. Khan's illicit nuclear procurement and distribution network. The still ongoing investigation of Iran's clandestine nuclear programme. And not least, a surge in the sophistication of extremist networks - underscoring the potential for nuclear and radiological terrorism. Add to

  5. The globalization of insecurity: how the international economic order undermines human and national security on a world scale

    Directory of Open Access Journals (Sweden)

    Nafeez Mosaddeq Ahmed

    2009-03-01

    Full Text Available La seguridad nacional y humana ha sido fundamentalmente subestimada por políticas promovidas por instituciones claves de la globalización. La adopción de una conceptualización estato-céntrica de la seguridad demuestra cómo la globalización debilita y fragmenta el Estado, mientras militariza a los actores estatales y subestatales, contribuyendo sistemáticamente  a la emergencia de conflictos inter e intra-estatales. Un paradigma centrado en lo humano, que se focalise en el impacto de la globalización sobre los individuos y comunidades, muestra que este proceso esá vinculado con la generación de violencia estructural a lo largo de fronteras nacionales. Ambos niveles de procesos -el nacional y el humano- son mutualmente interdependientes e impactan el uno en el otro de forma recíproca. De aquí que la economía capitalista mundial ha creado un fenómeno que puede ser claramente descrito como la globalización de la inseguridad, generando en primera instancia conflicto y consecuentemente desestabilizando  naciones y comunidades, y en segundo lugar empobrecimiento, enfermedad y marginación. ________________ABSTRACT:National and human security has been fundamentally undermined by policies promoted by the key institutions of globalization. Adopting a state-centred conceptualization of security demonstrates how globalization at once weakens and fragments the state, while militarizing both the state and sub-state actors, contributing systematically to the emergence of intra- and inter-state conflicts. A human-centred framework, however, focusing on the impact of globalization on individuals and communities, shows that this process is further linked to the generation of structural violence across national boundaries. Both these national -and human- level processes are mutually interdependent and impact on one another reciprocally. Hence, the world capitalist economy has created a phenomenon that can be accurately described as the

  6. NASA/MSFC FY90 Global Scale Atmospheric Processes Research Program Review

    Science.gov (United States)

    Leslie, Fred W. (Editor)

    1990-01-01

    Research supported by the Global Atmospheric Research Program at the Marshall Space Flight Center on atmospheric remote sensing, meteorology, numerical weather forecasting, satellite data analysis, cloud precipitation, atmospheric circulation, atmospheric models and related topics is discussed.

  7. The securitization of health in the context of the war on terror. National security and global health: the conflict of imperatives.

    Science.gov (United States)

    Chung, Ryoa

    2017-03-01

    In this article, I want to show that the securitization of health issues in the name of national interests led to the militarization of health care in the context of the war against terrorism. However, the connection between health and security also gave way to the emergence of the notion of human security, thus, converging with the human right to health approach and the cosmopolitan discourse on global health. These two perspectives on the relation between health and security lead to conflicting imperatives in the current state of counter-terrorism operations. I argue that when the securitization of health concerns in the name of national security conflicts with the provision of health care in the name of universal human rights, the higher moral end must trump the prudential one. Moreover, it is a duty to promote the human right to health when liberal democracies in foreign policies directly violate this moral ideal in the name of national security.

  8. The Study Abroad Experience: A Crucial Element in Globalizing Business School Programs

    Science.gov (United States)

    Mangiero, George A.; Kraten, Michael

    2011-01-01

    Globalization is a fundamental reality of modern business practice. Participation in a study abroad program is a crucial element in helping students become well rounded global business leaders; it is an increasingly important element of a well rounded business curriculum. A semester or summer abroad, properly conceived and designed, can provide…

  9. Food Safety as a contributor to Food Security: global policy concerns & challenges

    OpenAIRE

    Vijay Kumar Chattu

    2015-01-01

    The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1). Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safet...

  10. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran.

    Science.gov (United States)

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households' food security. The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively ( P security in the baseline and at the end of the study ( P > 0.05). Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  11. GLOBEC: Global Ocean Ecosystems Dynamics: A component of the US Global Change Research Program

    Science.gov (United States)

    1991-01-01

    GLOBEC (GLOBal ocean ECosystems dynamics) is a research initiative proposed by the oceanographic and fisheries communities to address the question of how changes in global environment are expected to affect the abundance and production of animals in the sea. The approach to this problem is to develop a fundamental understanding of the mechanisms that determine both the abundance of key marine animal populations and their variances in space and time. The assumption is that the physical environment is a major contributor to patterns of abundance and production of marine animals, in large part because the planktonic life stages typical of most marine animals are intrinsically at the mercy of the fluid motions of the medium in which they live. Consequently, the authors reason that a logical approach to predicting the potential impact of a globally changing environment is to understand how the physical environment, both directly and indirectly, contributes to animal abundance and its variability in marine ecosystems. The plans for this coordinated study of of the potential impact of global change on ocean ecosystems dynamics are discussed.

  12. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  13. A global study of undergraduate environmental engineering programs

    International Nuclear Information System (INIS)

    Abro, Q.M.

    2005-01-01

    Recent analyses of environmental engineering and management (EE and M) field has highlighted its rapidly expanding size and increasingly diverse nature (Hart and Nolan, 1999). The last 30 years have seen growing international recognition that the challenges associated with environmental degradation and sustainable development have important implications for, and connections with, education and research (IUCN, 1970; UNCED, 1992). The concept of environmental education is now widespread in national educational policies, curriculum documents, curriculum development initiatives, and conservation strategies. Reflecting this trend, several universities throughout the world offer a wide range of graduate as well as undergraduate programs in environment. These programs have originated from various academic schools and disciplines (engineering, public policy, business, management, etc) creating considerable diversity of focus, themes emphasized, courses and methods of offerings. The rise of these programs, in part, reflects the growing need for engineers, technologists as well as managers, who are able to understand, contribute to, and manage a wide variety of technology-based programs and organizations. In addition, the large number of environmental engineering research journals, professional associations and international/national conferences point to the rapid growth of this field. This paper will examine the trends in provision, type of program, major curriculum focus of undergraduate environmental engineering and management education and then compare these trends with the emerging trends in the environmental engineering and management research journals of the last decade. (author)

  14. Rapid emergence of pathogens in agro-ecosystems: global threats to agricultural sustainability and food security.

    Science.gov (United States)

    McDonald, Bruce A; Stukenbrock, Eva H

    2016-12-05

    Agricultural ecosystems are composed of genetically depauperate populations of crop plants grown at a high density and over large spatial scales, with the regional composition of crop species changing little from year to year. These environments are highly conducive for the emergence and dissemination of pathogens. The uniform host populations facilitate the specialization of pathogens to particular crop cultivars and allow the build-up of large population sizes. Population genetic and genomic studies have shed light on the evolutionary mechanisms underlying speciation processes, adaptive evolution and long-distance dispersal of highly damaging pathogens in agro-ecosystems. These studies document the speed with which pathogens evolve to overcome crop resistance genes and pesticides. They also show that crop pathogens can be disseminated very quickly across and among continents through human activities. In this review, we discuss how the peculiar architecture of agro-ecosystems facilitates pathogen emergence, evolution and dispersal. We present four example pathosystems that illustrate both pathogen specialization and pathogen speciation, including different time frames for emergence and different mechanisms underlying the emergence process. Lastly, we argue for a re-design of agro-ecosystems that embraces the concept of dynamic diversity to improve their resilience to pathogens. This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'. © 2016 The Author(s).

  15. Source Security Program in the Philippines: a lost source search experience

    International Nuclear Information System (INIS)

    Romallosa, Kristine M.; Salabit, Maria T.; Caseria, Estrella; Valdezco, Eulinia

    2008-01-01

    The Philippine Nuclear Research Institute (PNRI), the national agency in the licensing and regulations of radioactive materials in the country, is strengthening its capabilities in the security of radioactive sources. Part of this program is the PNRI's participation in the Regional Security of Radioactive Sources (RSRS) Project of the Australian Nuclear Science and Technology Organization (ANSTO). The project has provided equipment and methods training, assistance in the development of PNRI's own training program and support for actual orphan source search activities. On May 2007, a source search for the two lost Cs-137 level gauges of a steel manufacturing company was conducted by the PNRI and ANSTO. The source search are the: a) Development of instrument and source search training for the team, the National Training Workshop on Orphan Source Searches which was organized and conducted as a result of train-the-trainors fellowship under the RSRS project; and b) Planning and implementation of the lost source search activity. The conduct of the actual search on warehouses, product yard, canals, dust storage, steel making building, scrap yards and nearby junk shops of the steel plant took one week. The week-long search did not find the lost sources. However, naturally occurring radioactive materials identified to be Thorium, were found on sands, bricks and sack piles that are stored and/or generally present in the warehouses, yard and steel making building. The search activity had therefore cleared the facility of the lost source and its corresponding hazards. The NORM found present in the plant's premises on the other hand brought the attention of the management of the needed measures to ensure safety of the staff from possible hazards of these materials. Currently, the course syllabus that was developed is continuously enhanced to accommodate the training needs of the PNRI staff particularly for the emergency response and preparedness. This component of the source

  16. Globalizing Technical Communication Programs: Visions, Challenges, and Emerging Directions

    DEFF Research Database (Denmark)

    Maylath, Bruce; Mousten, Birthe; Vandepitte, Sonia

    Speakers Maylath, Mousten and Vandepitte, co-authors of two chapters on what they call the Trans-Atlantic Project, will describe the programmatic framework for establishing the collaborative partnerships in which students studying technical writing in the U.S. work with students studying...... help achieve common program objectives, particularly in regard to intercultural negotiation and mediation processes. In addition, they will describe how they met course-specific objectives. For the technical writing course, such objectives included broadening students' awareness of the needs of readers...... translation in Europe to create procedural documents in Danish, Dutch, English, French, German and/or Italian. They will provide guidelines for  how international partnerships of this kind can be established between technical communication programs and translation programs anywhere, even in the abscence...

  17. The European Dimension of the Global Urban Development Program

    Directory of Open Access Journals (Sweden)

    Bubenko Pavlo T.

    2017-11-01

    Full Text Available The article is aimed at studying the process of evolutionary formation of the EU Cities Development Program and analyzing the strategic instrumentarium for the urban development within the currently established EU urban policy at the present stage. The key features of the process of formation of the EU urban policy have been analyzed, the main stages of evolutionary formation of the integrated EU Cities Development Program have been defined and described. In the context of ensuring an integrated approach to the sustainable urban development and complementary positioning of urban development in the EU’s territorial development and cohesion strategies, the European Union’s normative and legal framework on urban development was researched. As a result of the conducted research, the strategic instrumentarium of implementation of the EU Cities Development Program has been systematized.

  18. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  19. The Comprehensive Nuclear-Test-Ban Treaty and Its Relevance for the Global Security

    Directory of Open Access Journals (Sweden)

    Dáša ADAŠKOVÁ

    2013-06-01

    Full Text Available The Comprehensive Nuclear-Test-Ban Treaty (CTBT is one of important international nuclear non-proliferation and disarmament measures. One of its pillars is the verification mechanism that has been built as an international system of nuclear testing detection to enable the control of observance of the obligations anchored in the CTBT. Despite the great relevance to the global non-proliferation and disarmament efforts, the CTBT is still not in force. The main aim of the article is to summarize the importance of the CTBT and its entry into force not only from the international relations perspective but also from the perspective of the technical implementation of the monitoring system.

  20. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-01-01

    The three papers of this document were written in the framework of a seminar organized the 30 may 2002 by the IFRI in the framework of its program Energy and Climatic Change. The first presentation deals with the american oil policy since 1980 (relation between the oil dependence and the energy security, the Reagan oil policy, the new oil policy facing the increase of the dependence). The second one deals with the US energy security (oil security, domestic energy security, policy implications). The last presentation is devoted to the US oil dependence in a global context and the problems and policies of international energy security. (A.L.B.)