WorldWideScience

Sample records for government securities dealer

  1. 17 CFR 404.5 - Securities counts by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered government securities brokers and dealers. 404.5 Section 404.5 Commodity and Securities Exchanges... AND PRESERVATION OF RECORDS § 404.5 Securities counts by registered government securities brokers and dealers. (a) Securities counts. Every registered government securities broker or dealer shall comply with...

  2. 17 CFR 405.3 - Notification provisions for certain registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... certain registered government securities brokers and dealers. 405.3 Section 405.3 Commodity and Securities... REPORTS AND AUDIT § 405.3 Notification provisions for certain registered government securities brokers and dealers. (a) Every registered government securities broker or dealer, other than a government securities...

  3. 17 CFR 405.2 - Reports to be made by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... government securities broker or dealer shall file Part I of Form BD-Y2K (§ 249.618 of this title) prepared as..., shall file Part II of Form BD-Y2K (§ 249.618 of this title). Part II of Form BD-Y2K shall address each... registered government securities broker or dealer that was not required to file Part II of Form BD-Y2K under...

  4. 17 CFR 401.7 - Temporary exemption for certain government securities brokers and dealers terminating business on...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Temporary exemption for certain government securities brokers and dealers terminating business on or before October 31, 1987. 401... government securities brokers and dealers terminating business on or before October 31, 1987. During the...

  5. 17 CFR 404.2 - Records to be made and kept current by registered government securities brokers and dealers...

    Science.gov (United States)

    2010-04-01

    ... on a consolidated basis, by the highest level holding company that is a Material Associated Person..., as of quarter-end for the registered government securities broker or dealer and its highest level... registered government securities broker or dealer and its highest level holding company that is a Material...

  6. 17 CFR 400.6 - Notice of withdrawal from business as a government securities broker or dealer by a financial...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Notice of withdrawal from business as a government securities broker or dealer by a financial institution. 400.6 Section 400.6... SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL APPLICATION § 400.6 Notice of withdrawal from business as a...

  7. 17 CFR 401.9 - Exemption for certain foreign government securities brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... legally necessary, its customers (with respect to customer information) to permit the foreign broker or..., delivering, and safeguarding funds and securities in connection with the transactions on behalf of the U.S...

  8. 17 CFR 402.2 - Capital requirements for registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ...)(B) of this title; (7) Loans to commercial banks for one business day of immediately available funds...; (3) Demand deposits in the case where the counterparty is a commercial bank; (4) Loans for one... made in the case where the counterparty is a commercial bank; (5) Custodial holdings of securities in...

  9. 17 CFR 240.15Ca2-3 - Registration of successor to registered government securities broker or government securities...

    Science.gov (United States)

    2010-04-01

    ... business of a government securities broker or government securities dealer registered pursuant to section... the registration of the successor if the successor, within 30 days after such succession, files an... securities broker or government securities dealer succeeds to and continues the business of a predecessor...

  10. 76 FR 42395 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Science.gov (United States)

    2011-07-18

    ... Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants...-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based...'') relating to external business conduct standards for security-based swap dealers (``SBS Dealers'') and major...

  11. 31 CFR 103.19 - Reports by brokers or dealers in securities of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by brokers or dealers in... Reports Required To Be Made § 103.19 Reports by brokers or dealers in securities of suspicious transactions. (a) General. (1) Every broker or dealer in securities within the United States (for purposes of...

  12. 12 CFR 208.37 - Government securities sales practices.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Government securities sales practices. 208.37... Securities-Related Activities § 208.37 Government securities sales practices. (a) Scope. This subpart is... dealer. (d) Recommendations to customers. In recommending to a customer the purchase, sale or exchange of...

  13. 17 CFR 230.139a - Publications by brokers or dealers distributing asset-backed securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Publications by brokers or... Publications by brokers or dealers distributing asset-backed securities. The publication or distribution by a broker or dealer of information, an opinion or a recommendation with respect to asset-backed securities...

  14. 17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... options, forwards, futures, swap agreements, or collars involving currencies, interest or other rates... derivatives dealers. 240.15a-1 Section 240.15a-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Under the Securities Exchange Act of 1934 Exemption of Certain Otc Derivatives Dealers § 240.15a-1...

  15. 17 CFR 240.15c1-3 - Misrepresentation by brokers, dealers and municipal securities dealers as to registration.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Misrepresentation by brokers...-The-Counter Markets § 240.15c1-3 Misrepresentation by brokers, dealers and municipal securities..., as used in section 15(c)(1) of the Act, is hereby defined to include any representation by a broker...

  16. 17 CFR 240.15a-10 - Exemption of certain brokers or dealers with respect to security futures products.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain brokers... Brokers and Dealers § 240.15a-10 Exemption of certain brokers or dealers with respect to security futures products. (a) A broker or dealer that is registered by notice with the Commission pursuant to section 15(b...

  17. 17 CFR 240.15Ca2-5 - Consent to service of process to be furnished by non-resident government securities brokers or...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... Government Securities Dealers § 240.15Ca2-5 Consent to service of process to be furnished by non-resident... government securities dealer by the service of process upon the Commission and the forwarding of a copy...

  18. 26 CFR 1.475(a)-3 - Acquisition by a dealer of a security with a substituted basis.

    Science.gov (United States)

    2010-04-01

    ...) Section 475(a) applies only to changes in value of the security occurring after the acquisition; and (2) Any built-in gain or loss with respect to the security (based on the difference between the fair market value of the security on the date the dealer acquired it and its basis to the dealer on that date...

  19. 76 FR 46668 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Science.gov (United States)

    2011-08-03

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...

  20. 17 CFR 403.1 - Application of part to registered brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered brokers and dealers. 403.1 Section 403.1 Commodity and Securities Exchanges DEPARTMENT OF THE... SECURITIES AND BALANCES § 403.1 Application of part to registered brokers and dealers. With respect to their activities in government securities, compliance by registered brokers or dealers with § 240.8c-1 of this...

  1. 17 CFR 403.5 - Custody of securities held by financial institutions that are government securities brokers or...

    Science.gov (United States)

    2010-04-01

    ... institution does not initiate the purchase of the specified securities by the close of the next business day... physical delivery of certificates if the securities are issued in certificated form, or to direct a... business day. (6) A government securities broker or dealer that is a branch or agency of a foreign bank...

  2. 17 CFR 240.15Ba2-4 - Registration of successor to registered municipal securities dealer.

    Science.gov (United States)

    2010-04-01

    ... event that a municipal securities dealer succeeds to and continues the business of a registered... registration of the successor if the successor, within 30 days after such succession, files an application for... municipal securities dealer succeeds to and continues the business of a registered predecessor municipal...

  3. 17 CFR 201.520 - Suspension of registration of brokers, dealers, or other Exchange Act-registered entities...

    Science.gov (United States)

    2010-04-01

    ... brokers, dealers, or other Exchange Act-registered entities: Application. 201.520 Section 201.520... Rules Relating to Temporary Orders and Suspensions § 201.520 Suspension of registration of brokers... of a registered broker, dealer, municipal securities dealer, government securities broker, government...

  4. 17 CFR 240.17a-13 - Quarterly security counts to be made by certain exchange members, brokers, and dealers.

    Science.gov (United States)

    2010-04-01

    ... a national securities exchange who transacts a business in securities directly with or for others... transacts a business in securities through the medium of any member of a national securities exchange, and... or dealer transacting business as a sole proprietor may also effect occasional transactions in other...

  5. INTERNATIONAL GOVERNMENT SECURITIES: SPECIFIC FUNCTIONING

    Directory of Open Access Journals (Sweden)

    N. Versal

    2013-11-01

    Full Text Available It’s disclosed the features of the international government securities market during 1993 – 2012: main players are the developed countries (Western Europe, Canada, USA with the increasing role of developing countries; debt crises have the negative impact as on the development of the international government securities market, but also on the international capital market as a whole; debt crises are not a spontaneous phenomenon, and usually occur as a result of inadequate growth in GDP increasing government debt.

  6. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  7. 17 CFR 240.15Ba2-2 - Application for registration of non-bank municipal securities dealers whose business is...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application for registration of non-bank municipal securities dealers whose business is exclusively intrastate. 240.15Ba2-2... registration of non-bank municipal securities dealers whose business is exclusively intrastate. (a) An...

  8. 17 CFR 249.618 - Form BD-Y2K, information required of broker-dealers pursuant to section 17 of the Securities...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form BD-Y2K, information... Exchange Members, Brokers, and Dealers § 249.618 Form BD-Y2K, information required of broker-dealers... FR 37674, July 13, 1998] Editorial Note: For Federal Register citations affecting Form BD-Y2K, see...

  9. 17 CFR 249.1100 - Form MSD, application for registration as a municipal securities dealer pursuant to rule 15Ba2-1...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form MSD, application for registration as a municipal securities dealer pursuant to rule 15Ba2-1 under the Securities Exchange Act of 1934 or amendment to such application. 249.1100 Section 249.1100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  10. 17 CFR 450.4 - Custodial holdings of government securities.

    Science.gov (United States)

    2010-04-01

    ... securities as of the close of business upon the instruction of such broker or dealer, it shall send a... depository institution's control or direction that are not in its physical possession, where the securities... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Custodial holdings of...

  11. Food security governance: a systematic literature review

    NARCIS (Netherlands)

    Candel, J.J.L.

    2014-01-01

    The role of governance has been receiving increasing attention from food security scholars in recent years. However, in spite of the recognition that governance matters, current knowledge of food security governance is rather fragmented. To provide some clarity in the debate about the role of

  12. 75 FR 80173 - Further Definition of “Swap Dealer,” “Security-Based Swap Dealer,” “Major Swap Participant...

    Science.gov (United States)

    2010-12-21

    ...\\ As one example, a non-financial company that engages in both swap dealing and other commercial... reduce risk, increase transparency, and promote market integrity within the financial system, including... swaps with more counterparties than do non-dealers, and in some markets, non-dealers tend to constitute...

  13. Information Security Governance: When Compliance Becomes More Important than Security

    OpenAIRE

    Tan , Terence C. C.; Ruighaver , Anthonie B.; Ahmad , Atif

    2010-01-01

    International audience; Current security governance is often based on a centralized decision making model and still uses an ineffective 20th century risk management approach to security. This approach is relatively simple to manage since it needs almost no security governance below the top enterprise level where most decisions are made. However, while there is a role for more corporate governance, new regulations, and improved codes of best practice to address current weak organizational secu...

  14. Governing for Enterprise Security (Briefing Charts)

    Science.gov (United States)

    2005-01-01

    governance/stakeholder.html © 2005 by Carnegie Mellon University page 16 Adequate Security and Operational Risk “Appropriate business security is that which...Sherwood 03] Sherwood, John; Clark; Andrew; Lynas, David. “Systems and Business Security Architecture.” SABSA Limited, 17 September 2003. Available at

  15. Dealer Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The dealer reporting databases contain the primary data reported by federally permitted seafood dealers in the northeast. Electronic reporting was implemented May 1,...

  16. Food security governance in Latin America

    NARCIS (Netherlands)

    Pérez-Escamilla, Rafael; Shamah-Levy, Teresa; Candel, Jeroen

    2017-01-01

    In spite of major advances in recent decades, food insecurity continues to be a pressing concern to policymakers across the world. Food security governance (FSG) relates to the formal and informal rules and processes through which interests are articulated, and decisions relevant to food security

  17. Exogenous shocks and governing energy security

    OpenAIRE

    Diriöz, Ali Oğuz

    2017-01-01

    Cataloged from PDF version of article. Thesis (Ph.D.): Bilkent University, Department of International Relations, İhsan Doğramacı Bilkent University, 2017. Includes bibliographical references (leaves 219-248). The research examines how governments maintain energy security when faced with exogenous shocks. The main focus of inquiry examines the relative influence of markets vs. geopolitics in the area of energy security using the comparative case studies of Turkey, France, and Netherl...

  18. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  19. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  20. 77 FR 70213 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Science.gov (United States)

    2012-11-23

    ...-market value of the proprietary positions (e.g., securities, money market instruments, and commodities... the deductions for securities and money market positions as compared with the standardized haircuts... and Markets, Securities and Exchange Commission, 100 F Street, NE., Washington, DC 20549-7010...

  1. 25 CFR 304.8 - Use of label by dealer.

    Science.gov (United States)

    2010-04-01

    ... GOVERNMENT MARK § 304.8 Use of label by dealer. Any dealer offering for sale silver bearing the Government mark may, if he wishes, attach to silver so marked a label or ticket calling attention to the...

  2. 17 CFR 240.15Cc1-1 - Withdrawal from registration of government securities brokers or government securities dealers.

    Science.gov (United States)

    2010-04-01

    ... Financial Industry Regulatory Authority, Inc.) in accordance with applicable filing requirements. Prior to....5(a) to update any inaccurate information. (b) A notice of withdrawal from registration filed by a... may determine as necessary or appropriate in the public interest or for the protection of investors...

  3. Foreign Under-Investment in US Securities and the Role of Relational Capital

    OpenAIRE

    Michael, Bryane

    2015-01-01

    Over 70 academic papers attempt to explain why foreigners invest in US securities. All ignore the vital role of the US broker-dealer. Macroeconomic factors like a trade balance or corporate governance may guide foreign investors toward certain markets. But US broker-dealers provide information to foreign investors and execute the actual trades. We hypothesize that particular foreign investors under-invest in US securities because of a lack of relational capital with US broker-dealers. We find...

  4. 77 FR 30595 - Further Definition of “Swap Dealer,” “Security-Based Swap Dealer,” “Major Swap Participant...

    Science.gov (United States)

    2012-05-23

    ... associated with owning certain types of securities or to gain economic exposure akin to ownership of certain... would insert a loophole into the definition.\\56\\ Some commenters expressed the view that mere active... volume, revenues and profits of such activities, the person's value at risk (VaR) and exposure from such...

  5. 17 CFR 240.3b-15 - Definition of ancillary portfolio management securities activities.

    Science.gov (United States)

    2010-04-01

    ... governing body of the dealer and included in the internal risk management control system for the dealer... of incidental trading activities for portfolio management purposes; and (3) Are limited to risk... portfolio management securities activities. 240.3b-15 Section 240.3b-15 Commodity and Securities Exchanges...

  6. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  7. The challenges of multi-layered security governance in Ituri

    DEFF Research Database (Denmark)

    Hoffmann, Kasper; Vlassenroot, Koen

    governance is that the inclusion of local non-state actors in security governance will improve security provision to people because they have more legitimacy. But in reality ‘multi-layered’ security governance is often marked by conflict and competition as much as by collaboration and common solutions......There has been a slow, but growing awareness among external actors that some local non-state security actors should be involved in security governance in conflict-affected situations. Already in 2006, the OECD published a report that called for a ‘multi-layered’ approach to reforming actors...... and institutions that provide security and justice services (Scheye and McLean, 2006). Often these actors consist of local authorities, such as customary chiefs, village elders, or business people working in collaboration with different kinds of self-defense groups. The idea behind ‘multi-layered’ security...

  8. Governing for Enterprise Security (GES) Implementation Guide

    National Research Council Canada - National Science Library

    Westby, Jody R; Allen, Julia H

    2007-01-01

    .... If an organization's management does not establish and reinforce the business need for effective enterprise security, the organization's desired state of security will not be articulated, achieved, or sustained...

  9. Security and Peace Mechanisms for Good Governance in Nigeria ...

    African Journals Online (AJOL)

    In Nigeria, governments at all levels have intensified efforts to address issues bordering on insecurity with a view to building security and peace for good governance. It is however, disheartening that despite various security measures put in place to tackle the problem, Nigeria is yet to be free from recurrent cases of armed ...

  10. 17 CFR 403.2 - Hypothecation of customer securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Hypothecation of customer... UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.2 Hypothecation of customer securities. Every registered government securities broker or dealer...

  11. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  12. E-Commerce and Security Governance in Developing Countries

    Science.gov (United States)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  13. 17 CFR 240.15b2-2 - Inspection of newly registered brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... brokers and dealers. 240.15b2-2 Section 240.15b2-2 Commodity and Securities Exchanges SECURITIES AND... Regulations Under the Securities Exchange Act of 1934 Registration of Brokers and Dealers § 240.15b2-2 Inspection of newly registered brokers and dealers. (a) Definition. For the purpose of this section the term...

  14. 17 CFR 240.15b1-1 - Application for registration of brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... of brokers or dealers. 240.15b1-1 Section 240.15b1-1 Commodity and Securities Exchanges SECURITIES... Rules and Regulations Under the Securities Exchange Act of 1934 Registration of Brokers and Dealers § 240.15b1-1 Application for registration of brokers or dealers. (a) An application for registration of...

  15. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  16. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    The Administration is claiming success in reversing the deterioration in security that had become acute by the end of 2006, attributing the gains to a troop surge strategy announced by President Bush on January 10, 2007...

  17. Just Security and the Crisis of Global Governance

    OpenAIRE

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade into others. Managing them so as to avoid such failures is an essential function of global governance. Public space is the home of governance (formal and informal) and of rights-exercising groups and ...

  18. THE GENESIS OF THE FUNCTIONS OF GOVERNMENT DEBT SECURITIES

    Directory of Open Access Journals (Sweden)

    V. Osetskyi

    2015-06-01

    Full Text Available Government borrowings appear at a certain stage of development the economic system. Governments used loans many centuries ago because there are often occurred situations when borrowings were the only way to attract additional financial resources. The preconditions for government loans from the position of creditors are also important. These, in particular, include: the availability of subjects that have the temporarily available funds; investor confidence in the state, that stimulating their interest in buying government debt securities; state’s ability to repay its obligations and so on. Thus, the article deals with the basic prerequisites of the government securities market and its function at different stages of develop-ment of economic relations. So, it was found, that the main functions of local borrowing in XIV-XX centuries include the following: fiscal, public debt management, improved economic situation in some areas and repayment of previously issued loans. In modern conditions the functions of government securities have expanded and include: regulation of the money market and stock market, smoothing unevenness of funds flow to the budget, funding various pro-grams, support the liquidity of financial institutions. The author also highlights that objective necessity of using government borrowing associated with the presence of contradictions between the existing needs of society and the state’s capacity to satisfy them within existing financial re-sources. And in such situations government securities are a means of mobilizing additional financial resources to the state budget.

  19. Just Security and the Crisis of Global Governance

    NARCIS (Netherlands)

    Durch, W.; Larik, J.; Ponzio, R.

    2016-01-01

    Pursuing security and justice jointly in global governance will be vital to human progress in the twenty-first century. Humanity lives and operates simultaneously in three spaces critical to contemporary life and governance: public, transactional and ecological. Failures in one space can cascade

  20. Standardization Of Dealers

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The dealer management system (DMS) is a data warehouse that stores federal and state dealer permit and license information. The issuing agency, whether it is a state...

  1. 17 CFR 449.2 - Form G-FINW, notification by financial institutions of cessation of status as government...

    Science.gov (United States)

    2010-04-01

    .... This form is to be used by financial institutions that are government securities brokers or dealers to... available from the Board of Governors of the Federal Reserve System, the Comptroller of the Currency, the...

  2. 17 CFR 240.15g-4 - Disclosure of compensation to brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... brokers or dealers. 240.15g-4 Section 240.15g-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... § 240.15g-4 Disclosure of compensation to brokers or dealers. Preliminary Note: Brokers and dealers may..., and dominated and controlled markets. (a) Disclosure requirement. It shall be unlawful for any broker...

  3. 17 CFR 240.17a-7 - Records of non-resident brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... brokers and dealers. 240.17a-7 Section 240.17a-7 Commodity and Securities Exchanges SECURITIES AND... Stabilizing Activities § 240.17a-7 Records of non-resident brokers and dealers. (a)(1) Except as provided in paragraphs (b) and (c) of this section, each non-resident broker or dealer registered or applying for...

  4. 17 CFR 240.17a-11 - Notification provisions for brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... brokers and dealers. 240.17a-11 Section 240.17a-11 Commodity and Securities Exchanges SECURITIES AND... Stabilizing Activities § 240.17a-11 Notification provisions for brokers and dealers. (a) This section shall apply to every broker or dealer registered with the Commission pursuant to section 15 of the Act. (b)(1...

  5. 17 CFR 240.17a-23 - Recordkeeping and reporting requirements relating to broker-dealer trading systems.

    Science.gov (United States)

    2010-04-01

    ... requirements relating to broker-dealer trading systems. 240.17a-23 Section 240.17a-23 Commodity and Securities... relating to broker-dealer trading systems. (a) Scope of section. This section shall apply to any registered broker or dealer that acts as the sponsor of a broker-dealer trading system. (b) Definitions. For...

  6. 75 FR 13176 - Self-Regulatory Organizations; National Association of Securities Dealers, Inc. (n/k/a Financial...

    Science.gov (United States)

    2010-03-18

    ... Regulation of Securities, Business Law Section, American Bar Association (ABA), to Jonathan Katz, Secretary... Securities, Business Law Section, American Bar Association, to Jonathan Katz, Secretary, SEC, dated January 4... of the receipt of investment banking business would violate the spinning provision. Instead, FINRA is...

  7. Patching security governance : an empirical view of emergent governance mechanisms for cybersecurity

    NARCIS (Netherlands)

    van Eeten, M.J.G.

    2017-01-01

    Purpose: The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a

  8. RETHINKING THE GOVERNANCE OF SECURITY: THE PROBLEM OF UNCONSCIOUS CONSEQUENCES

    Directory of Open Access Journals (Sweden)

    CARLOS SOLAR FORNAZZARI

    2017-12-01

    Full Text Available Friesendorf and Daase, both researchers from the Peace Reasearch Institute Frankfurt (PRIF, establish in Rethinking Security Governance the problem of unforeseen consequences that are the result of the implementation of almost any security policy. The results of this book confirm that many, but not all, consequences are problematic, due in part to the fact that the effects of a security policy have become contingent on an infinity of factors that make it highly complex to attribute to what extent success was due or the failure of a particular policy.

  9. 17 CFR 230.138 - Publications or distributions of research reports by brokers or dealers about securities other...

    Science.gov (United States)

    2010-04-01

    ... Section 15(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)); or (ii) Is a foreign... history provisions of General Instructions I.A.1. and I.A.2(a) of Form F-3; (B) Either: (1) Satisfies the... Securities Exchange Act of 1934 (§ 240.3a51-1 of this chapter). (b) Rule 144A offerings. If the conditions in...

  10. Government/Industry Partnership on the Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Cefus, Greg; Colhoun, Stefan C.; Freier, Keith D.; Wright, Kyle A.; Herdes, Gregory A.

    2006-01-01

    In the past, industry radiation protection programs were built almost exclusively around radiation safety and the minimization of radiation dose exposure to employees. Over the last decade, and especially the last few years, the emphasis has shifted to include the physical security and enhanced control of radioactive materials. The threat of nuclear and radiological terrorism is a genuine international security concern. In May 2004, the U.S. Department of Energy/U.S. National Nuclear Security Administration unveiled the Global Threat Reduction Initiative (GTRI) to respond to a growing international concern for the proper control and security of radioactive and nuclear materials. An integral part of the GTRI, the International Radiological Threat Reduction (IRTR) Program, was established in February 2002, originally as a Task Force. The IRTR Program is foremost a government-to-government cooperative program with the mission to reduce the risk posed by vulnerable radioactive materials that could be used in a Radioactive Dispersal Device (RDD). However, governments alone cannot prevent the misuse and illicit trafficking of radioactive sources. By expanding the role of private industry as a partner, existing government regulatory infrastructures can be enhanced by formulating and adopting industry self-regulation and self-policing measures. There is international concern regarding the security and control of the vast number of well-logging sources used during oil exploration operations. The prevalence of these sources, coupled with their portability, is a legitimate security concern. The energy exploration industry has well established safety and security protocols and the IRTR Program seeks to build on this foundation. However, the IRTR Program does not have sufficient resources to address the issue without industry assistance, so it is looking to the oil and gas industry to help identify alternative means for accomplishing our mutual objectives. This paper describes

  11. Water Security and Climate Change: The Need for Adaptive Governance

    Directory of Open Access Journals (Sweden)

    Tuula Honkonen

    2017-01-01

    Full Text Available Climate change will bring about unprecedented economic, social and environmental effects, which require both the mitigation of greenhouse gas emissions and adaptation to its adverse effects. Water is the main element through which the impacts of climate change will be felt. Climate change results in increased uncertainties, complexities, stress and potential for conflicts within water management, both among and within states. New forms of governance are needed if the world is to respond to the need to adapt to changes in freshwater supply and to manage water security risks. This paper suggests that adaptive governance should to be main-streamed into all water regulation to ensure the availability of and access to safe water resources and to prevent water-related conflicts. The paper discusses the concept of water security in the context of climate change, the threats that climate change poses to water security, and the concept and implications of adaptive governance as a possible solution. The application of adaptive governance requires a certain degree of institutional and normative flexibility, instruments and institutions that can respond and adapt to changes and manage the level of uncertainty associated with the impacts of climate change. The governance institutions, methods and instruments should be responsive to new information and different kinds of uncertainties, while reflecting the vulnerabilities, capacities, needs and priorities of both societies and ecosystems in the face of climate change. Water security risks could be reduced by increased hydrosolidarity among states, which would present the challenges posed by climate change on water governance and security as primarily an opportunity for new forms of cooperation.

  12. 48 CFR 832.202-4 - Security for Government financing.

    Science.gov (United States)

    2010-10-01

    ... accepted accounting principles and must be audited and certified by an independent public accountant or an... for Government financing. An offeror's financial condition may be considered adequate security to... offeror's financial condition, the contracting officer may obtain, to the extent required, the following...

  13. 48 CFR 232.202-4 - Security for Government financing.

    Science.gov (United States)

    2010-10-01

    ... financing. 232.202-4 Section 232.202-4 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Commercial Item Purchase Financing 232.202-4 Security for Government financing. (a)(2) When determining whether an offeror...

  14. 48 CFR 432.202-4 - Security for Government financing.

    Science.gov (United States)

    2010-10-01

    ... financing. 432.202-4 Section 432.202-4 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Commercial Item Purchase Financing 432.202-4 Security for Government financing. Prior to determining that an offeror's financial condition is adequate...

  15. Reforming Security Sector Governance South Asia | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In South Asia, security discourse has traditionally been confined to government circles, with no room for voices from civil society. ... L'honorable Chrystia Freeland, ministre du Commerce international, a annoncé le lancement d'un nouveau projet financé par le Centre de recherches pour le développement international ...

  16. Pelagic Dealer Commercial Landings Monitoring (HMS Dealers)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains summarized pounds of select pelagic fish species bought by selected federally permitted seafood dealers in the SE Region of the US mainland....

  17. 31 CFR 103.35 - Additional records to be made and retained by brokers or dealers in securities.

    Science.gov (United States)

    2010-07-01

    ... Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS... maintains a list containing the names, addresses, and account numbers of those persons from whom it has been... government document used to verify his identity. (2) The 30-day period provided for in paragraph (a)(1) of...

  18. 17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.

    Science.gov (United States)

    2010-04-01

    ... Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)); or (B) Is a foreign private issuer that as of the date of... history provisions of General Instructions I.A.1. and I.A.2(a) of Form F-3; (2) Either: (i) Satisfies the... an offering of penny stock as defined in Rule 3a51-1 of the Securities Exchange Act of 1934 (§ 240...

  19. Spain and Mediterranean Security Governance: Neighbours, Spaces and Actors

    Directory of Open Access Journals (Sweden)

    Sarah Wolff

    2007-12-01

    Full Text Available The 1999 Tampere Summit marked the start of the development of the external dimension of the European Union’s policy of Justice and Home Affairs (JHA. This external dimension has been reflected in the inclusion of JHA in agreements with third countries, and particularly with Mediterranean countries. Furthermore, the European NeighbourhoodPolicy (ENP, in addition to bilateral and multilateral programmes, confirmed the transformation of the JHA policy into one of the EU’s foreign policy objectives. In the light of this evolution, this article examines Spain’s role in the development of the Mediterraneandimension of the JHA policy: firstly, it covers the stance of José Luis Rodríguez Zapatero’s government toward the JHA policy and its external dimension; secondly, it explores the new parameters of governance in the area of security and the Spanish case through three main factors: the neighbours, spaces and actors that define this governance. Lastly, and within a context of a multiplicity of governance actors on security, it focuses on the Canary Islands,which have acquired a central importance with respect to the management of borders and the policy of development for Africa. The analysis of this period helps to explain the new security perceptions that define Spain’s policy in the Mediterranean.

  20. 17 CFR 404.1 - Application of part to registered brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered brokers and dealers. 404.1 Section 404.1 Commodity and Securities Exchanges DEPARTMENT OF THE... PRESERVATION OF RECORDS § 404.1 Application of part to registered brokers and dealers. Compliance by a registered broker or dealer with § 240.17a-3 of this title (pertaining to records to be made), § 240.17a-4 of...

  1. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  2. ASSIMILATION OF INVESTMENT POTENTIAL OF INSURANCE COMPANIES THROUGH GOVERNMENT SECURITIES

    Directory of Open Access Journals (Sweden)

    Angela TIMUS

    2017-02-01

    Full Text Available Investments in fixed capital and human capital represent a reliable way to the economicdevelopment of the Republic of Moldova. The acceleration of investments can be achieved through anactive and viable financial market. The stimulation of institutional investors and of the process ofsecurities issuing and trading is a strategic development tool for the country. The purpose of the study isto analyze insurance companies as institutional investors and to present opportunities for investment instate securities. Markowitz and Sharpe’s theories of efficient investment portfolios selection based onprofitability and risk formed the theoretical and methodological framework. The research is based on datafrom the National Commission for Financial Markets, on the reports of Moldova’s Ministry of Financeand on the statistics from National Bank a National Bureau of Statistics. For secondary analysis, datareports from international organization such as OECD and Insurance Europe and International MonetaryFund have been used. The study was conducted by classical methods of the economic and financialanalysis. The results of research have shown that government securities are the most profitable of allsecurities issued on the primary financial market in the Republic of Moldova. In recent years, interestrates at the state securities are extremely attractive, more attractive than returns on investment in otherareas. State securities are the safest investment because the guarantor of this investment is government.That is why state securities are a very attractive investment area for insurance companies. The stimulationof the investment activity in the state can be achieved by using the primary market of governmentsecurities as an investment tool for capitalization of the investment potential of the insurance market.

  3. 75 FR 65881 - Ownership Limitations and Governance Requirements for Security-Based Swap Clearing Agencies...

    Science.gov (United States)

    2010-10-26

    ... it determines they are necessary or appropriate to improve the governance of, or to mitigate systemic... Part IV Securities and Exchange Commission 17 CFR Part 242 Ownership Limitations and Governance... Ownership Limitations and Governance Requirements for Security- Based Swap Clearing Agencies, Security-Based...

  4. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-01-28

    ... DEPARTMENT OF THE TREASURY Order Granting a Temporary Exemption From Certain Government Securities... Department of the Treasury (Treasury) is issuing a temporary exemption from certain Government Securities Act... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also...

  5. Water Security at Local Government Level: What do People Think?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-06-01

    Full Text Available stream_source_info Meissner_2016.pdf.txt stream_content_type text/plain stream_size 2853 Content-Encoding UTF-8 stream_name Meissner_2016.pdf.txt Content-Type text/plain; charset=UTF-8 Water Security at Local... Government Level: What do People Think? By Dr. Richard Meissner Integrated Water Assessment Group Natural Resources and the Environment Council for Scientific and Industrial Research Presented at the Sustainable Water Seminar 2016, CSIR ICC, 2...

  6. Canada and the Challenges of Cyberspace Governance and Security

    Directory of Open Access Journals (Sweden)

    Ron Deibert

    2013-03-01

    Full Text Available When Canada stood with the United States and Britain in refusing to sign on to a new, statecontrolled future for the Internet, at December’s World Conference on Information Technology, it certainly made the federal government appear to be a stalwart champion of Internet freedom. But in reality, Canada’s approach to cyberspace governance and security has, at best, sent mixed signals about our commitment to Internet freedom. At worst, it has actually contributed to increasing on-line censorship and surveillance by the very undemocratic and illiberal regimes that Canada voted against at the conference. Unfortunately this is a dangerous time for Canada to wallow in aimlessness: when it comes to cyberspace governance and security, the momentum is headed in the direction of greater state control. As demographic realities indicate, Internet usage will increasingly belong to the global South and East, where freedom is an unsettled and elusive concept. If Canada truly seeks to guard against the Internet falling captive to the controls sought by repressive regimes, such as those in China and Russia, it will have to offer the world a compelling, competing vision that demonstrates integrity and dedication to genuine Internet freedom. Among other things, that means moving beyond traditional top-down, state-centred models of security, which are a poor fit for a decentralized, global, publicly shared, but largely privately developed, communications network. Imposing conventional, state led policing frameworks on cyberspace — for instance, in the name of fighting cyber crime — only provides legitimacy to regimes abroad when they bring their own state powers to censor Internet communications. It also means thinking more carefully about how much we should tolerate our Canadian technology developers continuing to supply tools of repression to the foreign regimes who seek to dominate their own people. Canada has the potential to take on a leadership role in

  7. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  8. Haiti’s Army, Stabilization and Security Sector Governance

    Directory of Open Access Journals (Sweden)

    Geoff Burt

    2016-09-01

    Full Text Available Haiti’s long and difficult security sector reform (SSR process has entered a new phase. The reinstatement of the Haitian armed forces, nearly 20 years after former President Jean-Bertrand Aristide disbanded them, adds a new set of actors and more complexity to a process already struggling to deliver results amidst a seemingly endless series of political crises. The armed forces must be an impartial and apolitical institution if they are to contribute to stability in Haiti – an uncertain proposition given their past inability to stay out of the political arena. Building on a summary of the latest developments in the reinstatement process, this paper discusses its implications for Haiti’s prolonged international engagement. In particular, the paper focuses on the process to develop a new White Paper on Defence and National Security in Haiti. This process has the potential to contribute to two of the most significant shortcomings of SSR in Haiti, a limited focus on security sector governance and a lack of local ownership. The reinstatement process has been an interesting test case of the international donor community’s commitment to the concept of local ownership, long held to be a moral and practical pillar of international engagement. Though reinstatement has been driven by Haitian authorities, the process has struggled to make progress without donor support, raising questions about the appropriate role of international actors in strategic decision-making at the national level. Regardless of their initial reaction to reinstatement, Haiti’s international donors risk missing an opportunity to influence the development of an important pillar of Haiti’s post-MINUSTAH security sector by choosing to remain on the sidelines.

  9. 17 CFR 401.5 - Exemption for corporate credit unions transacting limited government securities business with...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for corporate credit unions transacting limited government securities business with other credit unions. 401.5 Section 401.5... government securities business with other credit unions. (a)(1) Subject to the requirements of paragraph (b...

  10. 17 CFR 240.10b-3 - Employment of manipulative and deceptive devices by brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... deceptive devices by brokers or dealers. 240.10b-3 Section 240.10b-3 Commodity and Securities Exchanges... Contrivances § 240.10b-3 Employment of manipulative and deceptive devices by brokers or dealers. (a) It shall be unlawful for any broker or dealer, directly or indirectly, by the use of any means or...

  11. The uniqueness of the energy security, justice, and governance problem

    International Nuclear Information System (INIS)

    Goldthau, Andreas; Sovacool, Benjamin K.

    2012-01-01

    This article argues that among all policy fields exhibiting externalities of a global scale, energy stands out on four dimensions: vertical complexity, horizontal complexity, higher entailed costs, and stronger path dependency. These structural attributes are at odds with contemporary key challenges of energy security, energy justice, and low carbon energy transition. With regard to the latter, energy governance challenges occur related to unclear levels of authority and weak resilience. This has implications for energy scholarship, specifically relating to the political economy of energy transitions, discussions about common pool resources, systems analysis, and other neighboring disciplines. - Highlights: ► Among all policy fields exhibiting global externalities, energy stands out. ► It is characterized by greater complexity, higher costs, and stronger path dependency. ► This is at odds with key challenges relating to security, justice, and transition. ► Problems are particularly related to unclear levels of authority and weak resilience. ► Energy scholarship needs to focus further on these issues.

  12. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-03-11

    ... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... Department of the Treasury (Treasury) is granting temporary exemptions from certain Government Securities Act...).pdf. \\8\\ 75 FR 4626, January 28, 2010 Order Granting a Temporary Exemption from Certain Government...

  13. Government's role in power supply security. A working group report

    International Nuclear Information System (INIS)

    2004-01-01

    The working group was to analyse the Government's role in terms of improving the security of supply of the electricity market in exceptionally difficult capacity situations and to make propositions for the ways of arranging a tendering procedure concerning security of supply and capacity control, so as to meet the requirements of the EC Energy Internal Market Directives after 1 July 2004. The Working Group considers that there is no need at this stage to introduce a separate new system intended as a supplement to technical reserves in Finland. Such a system would not bring new capacity for the use of the power system, and in the case of existing capacity, production would only be transferred from one market to another. However, the situation may change from this, if there occur such factors on the market that aim to raise the market price of electricity or if it turned out that reserve power plants would be decommissioned on a large scale. The working group proposes that such a provision be added to the Electricity Market Act that would oblige the electricity supplier to notify the Energy Market Authority of a planned service outage of a power plant of at least 100 MVA producing electricity separately, which would fall within the time period 1 December - 28 February. The Energy Market Authority would be vested with the powers to postpone the outage due to a tight output situation, if there are not technical or safety- bound obstacles to this. It is important for the sufficiency of the power need of the Internal Market that the price signals of the market are reflected to both producers and consumers of electricity. The working group further proposes that the Ministry of Trade and Industry would look into development of the meter-reading requirements, so that they would, for their part, create the conditions for price flexibility in power consumption and for new sales products of electricity. In addition, tightening of the hourly metering requirement related to the

  14. Gun Dealers, USA.

    Science.gov (United States)

    Duker, Laurie; And Others

    In the United States, more than 11,500 adolescents' and young adults' lives are taken each year by firearms. Although Federal law prohibits minors from purchasing handguns, they typically get them by asking someone of legal age (18 years or older) to purchase them from one of the 256,771 Federally licensed gun dealers. This pamphlet answers…

  15. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  16. 17 CFR 240.11a1-6 - Transactions for certain accounts of OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Transactions for certain accounts of OTC derivatives dealers. 240.11a1-6 Section 240.11a1-6 Commodity and Securities Exchanges... effected by a member of a national securities exchange for the account of an OTC derivatives dealer that is...

  17. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  18. 76 FR 43376 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2011-07-20

    .../gsareg.htm . As noted in its request, on July 16, 2011, ICE Trust reorganized its corporate structure... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... temporary exemptions from certain Government Securities Act of 1986 provisions and regulations regarding...

  19. What we talk about when we talk about cybersecurity: security in internet governance debates

    Directory of Open Access Journals (Sweden)

    Josephine Wolff

    2016-09-01

    Full Text Available At meetings of internet governance organisations, participants generally agree that improving security is an important goal, but these conversations rarely yield consensus around how to achieve this outcome. One reason security plays this paradoxical role—as both a universal point of agreement and a continued source of contention—in these debates is that it has significantly different meanings to different stakeholders involved in these governance forums. In this paper, we discuss how different stakeholders define and frame internet security issues in the context of governance debates and analyse how these conflicting notions of security continue to shape emerging controversies.

  20. 27 CFR 31.75 - Dealer in beer and dealer in liquors at the same location.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Dealer in beer and dealer... Subject to Registration § 31.75 Dealer in beer and dealer in liquors at the same location. Any person who registers as a wholesale dealer in beer or retail dealer in beer and who thereafter begins to sell distilled...

  1. Water security at local government level. What do people think it means in eThekwini?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available aspects Negative aspects Helping municipalities to help themselves Working together we can secure our water future Diverse - from national government to local community and NGO People should get involved in securing their own water, for example... secure future Scientists from government, NGO's academia Good water quality will ensure healthy people, environments and livelihoods for now and in the future Surely mines can't use good quality water More for some (forever?) A water supply...

  2. Building a world class information security governance model

    CSIR Research Space (South Africa)

    Lessing, M

    2008-05-01

    Full Text Available practice documents. The resulting model covers all the relevant aspects on strategic, management and technical level when implemented altogether. This model includes the related aspects of Corporate Governance, Information Technology Governance...

  3. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    Science.gov (United States)

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  4. A Framework for the Governance of Information Security

    Science.gov (United States)

    Edwards, Charles K.

    2013-01-01

    Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…

  5. Governing Insecurity: Democratic Control of Military and Security ...

    African Journals Online (AJOL)

    P H Stoker

    democratic control of military and security institutions is strategic to democratisation for two main reasons: firstly because these institutions have a peculiar intimate relationship to political power and secondly because their security functions, including the management of insecurities that may be generated by democratisation ...

  6. 17 CFR 270.10b-1 - Definition of regular broker or dealer.

    Science.gov (United States)

    2010-04-01

    ... COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.10b-1 Definition of regular broker or dealer. The term regular broker or dealer of an investment company shall mean: (a) One... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of regular broker...

  7. 17 CFR 250.4 - Exemption of certain brokers, dealers and underwriters.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain brokers... and General Exemptions § 250.4 Exemption of certain brokers, dealers and underwriters. (a) General exemption. Subject to the provision of § 250.6, any broker, dealer or underwriter, as defined in paragraph...

  8. 17 CFR 300.304 - Retained rights of brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Retained rights of brokers or... Completion of Open Contractual Commitments § 300.304 Retained rights of brokers or dealers. (a) Nothing stated in these rules shall be construed to prejudice the right of a broker or dealer to any claim...

  9. 17 CFR 240.17h-2T - Risk assessment reporting requirements for brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... requirements for brokers and dealers. 240.17h-2T Section 240.17h-2T Commodity and Securities Exchanges... Organizations § 240.17h-2T Risk assessment reporting requirements for brokers and dealers. (a) Reporting requirements of risk assessment information required to be maintained by section 240.17h-1T. (1) Every broker...

  10. Redefining the business process of Department of Food Security and Agriculture in Government of Surabaya City

    Science.gov (United States)

    Cahyono, H.; Wessiani, N. A.

    2018-04-01

    Government of Indonesia has been launched the bureaucratic reform program since 2010. One of the action is conducted restructuring organization in all city governments. Department of Food Security and Agriculture in Government of Surabaya City is the result of merger from two Department, namely Bureau of Food Security and Department of Agriculture. This merger makes Department of Food Security and Agriculture to redefine their business process. The new business process is needed to be defined in order to align the new structure with the long term strategic planning of Surabaya City Government. This research aims to redefine the business process of Department of Food Security and Agriculture in Government of Surabaya City. The CIMOSA model is adopted for identifying the activities in the business process. The new business process is important for the department to allocate their resource, mainly the human resource and as the main input for the department to build their standard operating procedure.

  11. The governance of policing and security : ironies, myths and paradoxes

    NARCIS (Netherlands)

    Hoogenboom, A.B. (Bob); Punch, M.E.

    2010-01-01

    Policing today involves many different state and non-state actors. This book traces the process of unbounding policing, exploring the way that boundaries between public policing, regulators, inspectorates, intelligence services and private security are blurring.

  12. The rise of securities markets : what can government do?

    OpenAIRE

    Sylla, Richard

    1995-01-01

    Using U.S. securities markets as a case history, the author explores the role securities markets play in economic development, how they emerge, and how regulation can make them more effective. Why the United States? Two centuries ago, it was a small undeveloped country with serious financial problems. It confronted those problems and, guided by Alexander Hamilton, creatively reformed its financial system, which then became a foundation of the U.S. economic infrastructure and a bulwark for lon...

  13. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  14. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Bahrain, and Oman). In March 2011, Kuwait joined a GCC military intervention to...before the start of [2013]”—a statement that furthered Iraq’s argument that the U.N. Security Council should remove any remaining “Chapter 7” (of the...with alternative mechanisms, as discussed below. On December 15, 2010, the U.N. Security Council passed three resolutions—1956, 1957, and 1958—that

  15. Security clouds: Towards an ethical governance of surveillance in Europe

    NARCIS (Netherlands)

    den Boer, M.G.W.; van Buuren, J.

    2012-01-01

    Within the European Union (EU), several instruments have been created at local, national and international level to monitor the movements of persons, goods and systems. The political justification of this vast expansion of surveillance instruments is based on the supposed need for security actors to

  16. Service oriented architecture governance tools within information security

    OpenAIRE

    2012-01-01

    M.Tech. Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it ...

  17. Post-conflict development in Liberia: Governance, security, capacity ...

    African Journals Online (AJOL)

    the global system that led to the escalation of violence and human casualties. ... forces, their reintegration into the civilian life and the destruction of their ..... community leaders to set up intelligence security committees to monitor early warning ..... should move beyond the artificial separation between 'conflict as belonging to.

  18. Critical Vision of Security Governance in Three Latin American ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    María José Peréz

    2015-05-13

    May 13, 2015 ... It will compare security policies in 3 capitals of Latin America from 2008 to 2013. • Special attention ... Council. ▫ Deputy ministers or vice ministers. Critical aspect. Lack of political weigtht to ... ▫Interventions should be based on.

  19. Governing food security. Law, politics and the right to food

    NARCIS (Netherlands)

    Hospes, O.; Hadiprayitno, I.

    2010-01-01

    With only five years left until the 2015 deadline to achieve the Millennium Development Goals, food security still is a dream rather than reality: 'a situation that exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary

  20. Governance practices and critical success factors suitable for business information security

    OpenAIRE

    Bobbert, Yuri; Mulder, Hans

    2015-01-01

    Abstract: Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases they might even go under. IS literature emphasizes the necessity to govern Information Security at the level of the Board of Directors (BoD) and to execute (i.e. plan, build, run and monitor) it at management level. This paper describes explorative rese...

  1. 27 CFR 31.53 - Wholesale dealers in beer consummating sales at premises of other dealers.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Wholesale dealers in beer... beer consummating sales at premises of other dealers. Any dealer who has registered as a wholesale dealer in beer for the place from which that dealer conducts selling operations may consummate sales of...

  2. 76 FR 12645 - Ownership Limitations and Governance Requirements for Security-Based Swap Clearing Agencies...

    Science.gov (United States)

    2011-03-08

    ... 3235-AK74 Ownership Limitations and Governance Requirements for Security- Based Swap Clearing Agencies... the Dodd-Frank Act, the Commission shall adopt such rules if it determines that they are necessary or appropriate to improve the governance of, or to mitigate systemic risk, promote competition or mitigate...

  3. 48 CFR 32.202-4 - Security for Government financing.

    Science.gov (United States)

    2010-10-01

    ... is upon, e.g., the work in process, the contractor's plant, or the contractor's inventory. Contracting officers may be flexible in the choice of assets. The contract must also give the Government a..., working capital loans, various lines of credit, and revolving credit arrangements. (c) Other assets as...

  4. Privatisation of Security: Private Military Contractors Serving Governments

    Directory of Open Access Journals (Sweden)

    Jarosław Piątek

    2017-12-01

    Full Text Available Privatisation of security did not appear in the process of revolution. Under conditions of deepening international relations, as well as integration and globalisation processes, security of the state, as well as other entities, is subject to a number of dependencies. The article casts some doubt on how much states are prepared to take such actions, while not losing the attribute of monopoly on violence. Moreover, the article presents doubts about the ranks of modern armed forces. Private Military Firms (PMFs are new actors the actions of which affect the security. The contemporary image of the PMF functioning is a phenomenon on a global scale. In the twenty-first century, small businesses can have a huge impact on the reality and international affairs. Leaving military firms without state control proves that they do not understand the dynamics, range, risks and challenges posed by cooperation with entities that are allowed to use force. Furthermore, despite devastating consequences that occurred during the state stabilisation operations, these firms continued to outsource services to contractors, while not creating any legal control over them.

  5. 76 FR 27801 - Capital Requirements of Swap Dealers and Major Swap Participants

    Science.gov (United States)

    2011-05-12

    ... swaps, debt or equity securities, foreign currency, physical commodities, and other derivatives. The..., 23, and 140 Capital Requirements of Swap Dealers and Major Swap Participants; Proposed Rule #0;#0...

  6. Afghanistan: Post Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-26

    2011, attack on the Intercontinental Hotel in Kabul; a September 10, 2011, truck bombing in Wardak Province (which injured 77 U.S. soldiers); and...The trafficking generates an estimated $70 million-$100 million per year for insurgents—perhaps about 25% of the insurgents’ budgets that is...2013. U.S. officials say the government is increasingly able to execute parts of its budget and deliver basic goods and services. Donor aid already

  7. 17 CFR 240.36a1-2 - Exemption from SIPA for OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from SIPA for OTC derivatives dealers. 240.36a1-2 Section 240.36a1-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations...

  8. Factors Affecting Project Governance Of Arusha Archdiocesan Food Security And Livelihood Project In Monduli District Tanzania.

    Directory of Open Access Journals (Sweden)

    Kisame Deogratious

    2015-06-01

    Full Text Available Abstract This research project dealt with the factors affecting governance of Food security and livelihood projects a case study of the Food security and livelihood project that was implemented by AAIDRO in Monduli district and included 60 respondents all together. The specific objectives of this study intended to access the Leadership styles that are being used in project governance. The findings of the study indicated that 91.7 of the respondents were in favor of their leaders project governance styles it was portrayed that participative leadership style was being used by the leaders for project governance. Based on a sample of 60 project members this study had confirmed that a project leaders leadership roles like mentor facilitator innovator and coordinator are important in influencing project governance effectiveness which includes team mission goal achievement and empowerment open and honest communication

  9. 78 FR 44607 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-07-24

    ... (collectively ``regulated entities''). It is governed by a 21- member board composed of eleven independent... directors in overseeing the municipal securities market, it is imperative that the board identify candidates... non- dealer municipal advisors. The public representatives must be independent of any regulated entity...

  10. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  11. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    National Research Council Canada - National Science Library

    Emler, Jay S

    2008-01-01

    .... This thesis, therefore, examined alternatives states and local units of government might use to fund homeland security initiatives, ranging from conventional alternatives such as, asset forfeiture...

  12. 20 CFR 220.37 - When a child's disability determination is governed by the regulations of the Social Security...

    Science.gov (United States)

    2010-04-01

    ...) Inclusion as a disabled child in the employee's annuity rate under the social security overall minimum. (2... governed by the regulations of the Social Security Administration. 220.37 Section 220.37 Employees... Disability Determinations Governed by the Regulations of the Social Security Administration § 220.37 When a...

  13. Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    Science.gov (United States)

    Davis, Robert E.

    2017-01-01

    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…

  14. INFORMATION SECURITY AS PART OF THE OVERALL CORPORATE GOVERNANCE – IT GOVERNANCE

    Directory of Open Access Journals (Sweden)

    Mihaela Ungureanu

    2013-07-01

    Full Text Available A corporate governance system is not based solely on enforcement actions and incentives in order to obtain performance. In the context of a modern business environment, it must initiate and support research and development, contribute to social stability by harnessing human and cultural capital. Corporate governance plays a key role in improving the efficiency of the capital market through its impact on their operations and financial reporting integrity.IT governance has become a necessity due to the increased dependence, which is sometimes critical, against the company’s IT resources and due to the IT risks growth and diversification that management must settle, now operating in a heavily computerized environment.The changes in the informational environment and the expansion of new information technologies in organizations determine more complex and heterogeneous IT infrastructures. An essential issue is represented by the quality and performance of the existing system within an organization.

  15. Practising EU Security Governance in the Transatlantic Context: A Fragmentation of Power or Networked Hegemony?

    Directory of Open Access Journals (Sweden)

    Benjamin Zyla

    2013-07-01

    Full Text Available Security governance is commonly understood as an answer to the new and constantly changing security environment after the Cold War. In the context of the European Union (EU, the governance approach is believed to understand better the evolving institutional characters, networks, and processes of the EU’s actions in global politics. By employing a neo-Gramscian framework we challenge the 'orthodox view' in the EU governance literature that networks are flexible and hierarchy-immune responses to increasingly global policy challenges. We argue that networks in and of themselves reproduce existing power structures, and discuss the presence and replication of hegemony through these networks by examining the EU’s governance system post the Lisbon Treaty.

  16. 17 CFR 240.19c-1 - Governing certain off-board agency transactions by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Governing certain off-board agency transactions by members of national securities exchanges. 240.19c-1 Section 240.19c-1 Commodity... members of national securities exchanges. The rules of each national securities exchange shall provide as...

  17. 17 CFR 240.19c-5 - Governing the multiple listing of options on national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... of options on national securities exchanges. 240.19c-5 Section 240.19c-5 Commodity and Securities... of Exchange Members § 240.19c-5 Governing the multiple listing of options on national securities exchanges. (a) The rules of each national securities exchange that provides a trading market in standardized...

  18. 17 CFR 240.19c-3 - Governing off-board trading by members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... members of national securities exchanges. 240.19c-3 Section 240.19c-3 Commodity and Securities Exchanges... Members § 240.19c-3 Governing off-board trading by members of national securities exchanges. The rules of each national securities exchange shall provide as follows: (a) No rule, stated policy or practice of...

  19. 17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ...-Counter Markets § 240.15c3-4 Internal risk management control systems for OTC derivatives dealers. (a) An... derivatives dealer's internal risk management control system shall include the following elements: (1) A risk... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Internal risk management...

  20. MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned

    Science.gov (United States)

    Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran

    2014-01-01

    As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.

  1. A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment

    Science.gov (United States)

    Ula, M.; Ula, M.; Fuadi, W.

    2017-02-01

    As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.

  2. Global Food Security Governance: Civil Society Engagement in the Reformed Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.

    2015-01-01

    In 2007/8 world food prices spiked and global economic crisis set in, leaving hundreds of millions of people unable to access adequate food. The international reaction was swift. In a bid for leadership, the 123 member countries of the United Nations’ Committee on World Food Security (CFS) adopted a

  3. Total quality management: care dealers vs. car dealers.

    Science.gov (United States)

    Rubin, I M

    1992-01-01

    Let's turn our "flawed system into the Toyota City of world health care," proposes Fortune magazine. I shudder at the thought. Deming-Juran-type TQM procedures can help to ensure that cars and their drivers do not die on the road. Skillfully adapted for health care, these same procedures can help keep patients from dying on the operating table. These procedures can also respond to Fortune's indictment that the "U.S. medical system is as wasteful and managerially backward as Detroit before Henry Ford." However, people are not cars, and care dealers are not car dealers.

  4. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  5. The Integration of It Governance, Information Security Leadership and Strategic Alignment in Healthcare: A Correlational Study

    Science.gov (United States)

    Taft, Tiffany H.

    2017-01-01

    This dissertation is a study of the relationship between Information Technology Governance (ITG), information security leadership, and strategic alignment within a healthcare organization. Strong organizational leadership and adherence to the process are vital to the formulation and management of performance and implementation of key directives.…

  6. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  7. Medical countermeasures for national security: a new government role in the pharmaceuticalization of society.

    Science.gov (United States)

    Elbe, Stefan; Roemer-Mahler, Anne; Long, Christopher

    2015-04-01

    How do governments contribute to the pharmaceuticalization of society? Whilst the pivotal role of industry is extensively documented, this article shows that governments too are accelerating, intensifying and opening up new trajectories of pharmaceuticalization in society. Governments are becoming more deeply invested in pharmaceuticals because their national security strategies now aspire to defend populations against health-based threats like bioterrorism and pandemics. To counter those threats, governments are acquiring and stockpiling a panoply of 'medical countermeasures' such as antivirals, next-generation vaccines, antibiotics and anti-toxins. More than that, governments are actively incentivizing the development of many new medical countermeasures--principally by marshaling the state's unique powers to introduce exceptional measures in the name of protecting national security. At least five extraordinary policy interventions have been introduced by governments with the aim of stimulating the commercial development of novel medical countermeasures: (1) allocating earmarked public funds, (2) granting comprehensive legal protections to pharmaceutical companies against injury compensation claims, (3) introducing bespoke pathways for regulatory approval, (4) instantiating extraordinary emergency use procedures allowing for the use of unapproved medicines, and (5) designing innovative logistical distribution systems for mass drug administration outside of clinical settings. Those combined efforts, the article argues, are spawning a new, government-led and quite exceptional medical countermeasure regime operating beyond the conventional boundaries of pharmaceutical development and regulation. In the first comprehensive analysis of the pharmaceuticalization dynamics at play in national security policy, this article unearths the detailed array of policy interventions through which governments too are becoming more deeply imbricated in the pharmaceuticalization of

  8. Information governance and security protecting and managing your company's proprietary information

    CERN Document Server

    Iannarelli, John G

    2014-01-01

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Provides a step-by-step outline for developing an information governance policy that is appropriate for your organization Includes real-world examples and cases to help illustrate key ...

  9. The Dynamics of Good Governance in Promoting Energy Security: The Case of Bangladesh

    Directory of Open Access Journals (Sweden)

    Sakib B. Amin

    2017-07-01

    Full Text Available In the modern era, energy and its sustainability have emerged as one of the most important economic issues worldwide. It is widely believed that no country has managed to embrace development without ensuring a sustainable energy supply that could be accessed by a large portion of the population. Thus, this concept of energy sufficiency is of greater importance for the underdeveloped countries those, historically, had not been able to match their local energy demand. Apart from the inefficiencies and resource constraints associated with the energy sector, lack of good governance within an economy is believed to be a critical issue in aggravating energy crisis in those countries. However, following strategic impotence, political unwillingness and inefficient governance of the energy sector, the underdeveloped countries have failed to mitigate the energy deficits which in turn have hampered the development prospects in those countries. This paper highlights the potential roles good governance can play to promote energy security considering the case of Bangladesh, a developing country that is leaving no stones unturned in becoming a middle-income country by 2021. Besides, the role of good governance in complementing fuel diversification as a tool for ensuring energy security has also been put forward. Thus, the government of Bangladesh should reinstate good governance within the economy creating a favourable environment for investment in the energy sector which would enhance competition and mitigate inefficiencies in energy generation, transmission, and distribution.

  10. India's energy security: A sample of business, government, civil society, and university perspectives

    International Nuclear Information System (INIS)

    Bambawale, Malavika Jain; Sovacool, Benjamin K.

    2011-01-01

    This article explores the concept of energy security perceived and understood by a sample of government, business, civil society, and university stakeholders in India. Based on a literature review, the authors hypothesize what energy experts suggest energy security is for India. The article then tests these hypotheses through the use of a survey completed by 172 Indian respondents. The article begins by describing its methodology before summarizing the results of the literature review to distill seven working hypotheses related to energy security in India. These hypotheses relate to (1) security of energy supply, (2) equitable access to energy services, (3) research and development of new energy technologies, (4) energy efficiency and conservation, (5) self-sufficiency and trade in energy fuels, (6) nuclear power, and (7) the energy-water nexus. It then tests these hypotheses with our survey instrument before concluding with implications for energy policy in India and beyond. - Research highlights: → We measured the concept of energy security for India through a survey that tested the importance of 16 dimensions. → For our sample of respondents from India, as hypothesized, security of fossil fuel supply, R and D in new technologies, centralized energy systems, and the availability of clean water emerged as important dimensions. → Equitable access to energy and low energy intensity did not emerge as important dimensions of energy security for our sample even though we hypothesized them to be so.

  11. India's energy security: A sample of business, government, civil society, and university perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Bambawale, Malavika Jain, E-mail: sppmjb@nus.edu.s [Energy Governance Program, Centre on Asia and Globalisation, Lee Kuan Yew School of Public Policy, National University of Singapore, Oei Tiong Ham Building, 469C Bukit Timah Road, Singapore 259772 (Singapore); Sovacool, Benjamin K., E-mail: bsovacool@nus.edu.s [Energy Governance Program, Centre on Asia and Globalisation, Lee Kuan Yew School of Public Policy, National University of Singapore, Oei Tiong Ham Building, 469C Bukit Timah Road, Singapore 259772 (Singapore)

    2011-03-15

    This article explores the concept of energy security perceived and understood by a sample of government, business, civil society, and university stakeholders in India. Based on a literature review, the authors hypothesize what energy experts suggest energy security is for India. The article then tests these hypotheses through the use of a survey completed by 172 Indian respondents. The article begins by describing its methodology before summarizing the results of the literature review to distill seven working hypotheses related to energy security in India. These hypotheses relate to (1) security of energy supply, (2) equitable access to energy services, (3) research and development of new energy technologies, (4) energy efficiency and conservation, (5) self-sufficiency and trade in energy fuels, (6) nuclear power, and (7) the energy-water nexus. It then tests these hypotheses with our survey instrument before concluding with implications for energy policy in India and beyond. - Research highlights: {yields} We measured the concept of energy security for India through a survey that tested the importance of 16 dimensions. {yields} For our sample of respondents from India, as hypothesized, security of fossil fuel supply, R and D in new technologies, centralized energy systems, and the availability of clean water emerged as important dimensions. {yields} Equitable access to energy and low energy intensity did not emerge as important dimensions of energy security for our sample even though we hypothesized them to be so.

  12. Best Practices for Operating Government-Industry Partnerships in Cyber Security

    Directory of Open Access Journals (Sweden)

    Larry Clinton

    2015-12-01

    Full Text Available Since the publication of the first National Strategy to Secure Cyber Space in 2003 the US federal government has realized that due to the interconnected nature of the Internet, securing the system would require an industry-government partnership. However, defining exactly what that new partnership would look like and how it would operate has been unclear. The ramifications of this ambiguous strategy have been noted elsewhere including the 2011 JSS article “A Relationship on the Brink” which described the dysfunctional state of public private partnerships with respect to cyber security. Subsequently, a joint industry-government study of partnership programs has generated a consensus list of “best practices” for operating such programs successfully. Moreover, subsequent use of these principles seems to confirm their ability to enhance the partnership and hopefully helps ameliorate, to some degree, the growing cyber threat. This article provides a brief history of the evolution of public-private partnerships in cyber security, the joint study to assess them and the 12 best practices generated by that analysis.

  13. The Counter Trafficking in Persons Architecture in Kenya: a security governance perspective

    DEFF Research Database (Denmark)

    Owiso, Michael; Owiso, Michael

    2018-01-01

    The many and nuanced strategies adopted by Human traffickers has rendered the management of the crime to require complexity in approach. This is because of the inner workings and the multiplicity of actors; individuals, governments, non-governmental organizations, criminal networks - traffickers......, transnational entities, as well as the international community – either perpetuating it or working towards managing is diverse. Because of this, a study into the crime calls for an all-encompassing approach. This chapter looks into the measures of human trafficking in Kenya from a security governance...

  14. Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing

    Science.gov (United States)

    Wyld, David C.

    Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these challenging economic times. After an overview of the cloud computing concept, this article explores the security issues facing public sector use of cloud computing and looks to the risk and benefits of shifting to cloud-based models. It concludes with an analysis of the challenges that lie ahead for government use of cloud resources.

  15. Information security governance: a risk assessment approach to health information systems protection.

    Science.gov (United States)

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  16. Death and Taxes: Auto Dealers Face Their Final Reckoning

    Directory of Open Access Journals (Sweden)

    Robert Hutchinson

    2013-07-01

    While a paring down of the auto retail industry, particularly the domestic dealer networks, may be necessary and even welcomed by surviving dealers and the manufacturers they represent, the impact of this sector of the economy cannot be understated. Despite its importance, it has been often overlooked, as the government and public have focused their attention on large individual corporations, such as banks and the auto manufacturers themselves. While even the largest private dealerships in the nation, and even the large publicly-traded dealers such as Auto Nation and J.D. Buyrider, are relatively small in comparison with the likes of General Motors, Chrysler, AIG, Bank of America, etc., collectively they make up the single largest portion of the retail sector of the economy at 17%, accounting for $789B in annual sales in 2008[i] and 1,114,500 jobs with an annual payroll of $54B in 2007[ii]. Moreover, many dealers represent the backbone of small business, especially in small and rural communities throughout the country, paying some $20B in annual sales taxes to state and local municipalities.[iii

  17. 17 CFR 240.36a1-1 - Exemption from Section 7 for OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from Section 7 for OTC derivatives dealers. 240.36a1-1 Section 240.36a1-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  18. 17 CFR 240.15b9-2 - Exemption from SRO membership for OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption from SRO membership for OTC derivatives dealers. 240.15b9-2 Section 240.15b9-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  19. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    Science.gov (United States)

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance.

  20. 17 CFR 240.3b-12 - Definition of OTC derivatives dealer.

    Science.gov (United States)

    2010-04-01

    ... to options, forwards, futures, swap agreements, or collars involving currencies, interest or other... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of OTC derivatives... Securities Exchange Act of 1934 Definitions § 240.3b-12 Definition of OTC derivatives dealer. The term OTC...

  1. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    Science.gov (United States)

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the

  2. Economic sustainability, water security and multi-level governance of local water schemes in Nepal

    Directory of Open Access Journals (Sweden)

    Emma Hakala

    2017-07-01

    Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.

  3. 27 CFR 31.52 - Wholesale dealers in liquors consummating sales of wines or beer at premises of other dealers.

    Science.gov (United States)

    2010-04-01

    ... liquors consummating sales of wines or beer at premises of other dealers. 31.52 Section 31.52 Alcohol... § 31.52 Wholesale dealers in liquors consummating sales of wines or beer at premises of other dealers... wholesale dealer on account of those sales. (b) Sales of beer. Any wholesale dealer in liquors who has...

  4. Search, Dealers, and the Terms of Trade

    OpenAIRE

    Gabriele Camera

    2001-01-01

    I study a search theoretic model with pairwise meetings where dealers arise endogenously. The extent of intermediation depends on its cost, trade frictions, and the dealers' ability to negociate favorable terms of trade. Under Nash bargaining, there is a unique equilibrium where dealers buy and hold the low-storage-cost good and, depending on their relative bargaining power, resell it at a premium or a discount. The distribution of the terms of trade is non-degenerate unless storage cost and ...

  5. 17 CFR 449.1 - Form G-FIN, notification by financial institutions of status as government securities broker or...

    Science.gov (United States)

    2010-04-01

    ... Securities Exchange Act of 1934. This form is to be used by financial institutions that are government... Currency, the Federal Deposit Insurance Corporation, the Director of the Office of Thrift Supervision and...

  6. 17 CFR 249.510 - Form 10-M, consent to service of process by a nonresident general partner of a broker-dealer firm.

    Science.gov (United States)

    2010-04-01

    ..., consent to service of process by a nonresident general partner of a broker-dealer firm. This form shall be... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 10-M, consent to service of process by a nonresident general partner of a broker-dealer firm. 249.510 Section 249.510...

  7. 17 CFR 249.508 - Form 8-M, consent to service of process by a corporation which is a nonresident broker-dealer.

    Science.gov (United States)

    2010-04-01

    ... to service of process by a corporation which is a nonresident broker-dealer. This form shall be filed... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 8-M, consent to service of process by a corporation which is a nonresident broker-dealer. 249.508 Section 249.508 Commodity...

  8. East Asia’s energy needs: The impact on security and guidelines for regional governance

    Directory of Open Access Journals (Sweden)

    Pablo Pareja Alcaraz

    2010-04-01

    Full Text Available The last three decades have witnessed a spectacular (and not easily sustainable increase in the global demand for energy. This trend has a particular significance in East Asia owing to its heavy industrialisation, which is promoting intense regional growth, on top of the already delicate balance of security in the region and the traditional refusal by the region’s states to delegate power and management to supranational bodies. The aim of this article is to analyse the impact of East Asia’s energy needs on security and on the instruments of order and governance that have been developed in the region up until the present time. Thus, the article is divided into two parts; the first analyses East Asia’s energy programme and its most significant features: 1 a high dependence on oil imports from other regions, especially the Middle East; 2 a persistence of high dependency on pollutant fossil fuels; and 3 a high degree of energy insecurity. Meanwhile, the second part assesses the impact of energy on regional relations in different areas of security and guidelines for regional government: 1 the securitisation of energy and of the environment; 2 the reactivation of certain maritime conflicts; 3 the transformation of certain threats, and conventional and non-conventional challenges to regional security; 4 the rise of non-state actors (mainly environmental businesses and NGOs in East Asia’s international relations; 5 the maintaining of bilateralism and the promotion of multilateral initiatives; and 6 the emergence of new extra-regional geopolitical links and balances.

  9. 17 CFR 240.3a12-8 - Exemption for designated foreign government securities for purposes of futures trading.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption for designated foreign government securities for purposes of futures trading. 240.3a12-8 Section 240.3a12-8 Commodity and... trading. (a) When used in this Rule, the following terms shall have the meaning indicated: (1) The term...

  10. Transactional costs of the interaction between business and government as a threat to the economic security of the state

    Directory of Open Access Journals (Sweden)

    Evmenov Aleksandr

    2018-01-01

    Full Text Available The article considers the costs of the interaction between the state and business as a threat to the development of the economy of the Russian Federation from the point of view of ensuring economic security. The authors identified significant obstacles both from the business and from the government side, which pose a threat to economic security. The study is of interest for the further development of a system of providing the economic security of the Russian Federation.

  11. Social Inclusion, Security and E-Democracy Issues in E-Government: The Role of E-Learning.

    Science.gov (United States)

    Nunes, Miguel Baptista; McPherson, Maggie; Whiteside, Amy

    This paper focuses on aspects of e-government with emphasis on how local authorities are coping with the transition into the Information Society. E-government is reviewed in the flight of such topics as a social inclusion, security and e-democracy. The challenge has been set in the United Kingdom for local authorities to deliver 100% of services…

  12. The Current Mind-Set of Federal Information Security Decision-Makers on the Value of Governance: An Informative Study

    Science.gov (United States)

    Stroup, Jay Walter

    2014-01-01

    Understanding the mind-set or perceptions of organizational leaders and decision-makers is important to ascertaining the trends and priorities in policy and governance of the organization. This study finds that a significant shift in the mind-set of government IT and information security leaders has started and will likely result in placing a…

  13. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    Science.gov (United States)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  14. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  15. Pragmatism and Effective Fragmented Governance: Comparing Trajectories in Small Arms and Military and Security Services

    Directory of Open Access Journals (Sweden)

    Deborah Avant

    2013-10-01

    Full Text Available A hallmark of contemporary global governance is its complex nature. Understanding the implications of the array of “governors” and their efforts is paramount for scholars of global law and global politics. Most analyses have treated fragmented governance as a piece, arguing about its general effects. I concentrate instead on variation within fragmented situations, seeking to understand the conditions under which complexity yields more or less effective governance. I propose an analytical scheme for gauging effectiveness focused on how the array of governance efforts in an issue area relate to one another. I then compare these efforts in two issue arenas: small arms and private military and security services. Despite a similar complexity, similar array of actors trying to exert influence, and similar timing, complexity in small arms generated what most see as less effective results while in military and security services it has generated what seems to be a more promising path toward effective governance mechanisms. This difference is best explained with insights from pragmatism and network theory. When a broader range of relevant governors engage pragmatically to form linked networks governance is more likely. When governors engage ideologically and break off ties governance is less likely. Pragmatic engagement among the variety of relevant governors, including the US, is most likely to generate effective global governance. Una característica distintiva del gobierno mundial contemporáneo es su naturaleza compleja. Entender las implicaciones de la serie de "gobernadores" y sus esfuerzos es fundamental para los estudiosos del derecho internacional y la política mundial. La mayoría de los análisis han tratado el gobierno fragmentado como una pieza, discutiendo sobre sus efectos generales. El análisis se centra en cambio en la variación dentro de situaciones fragmentadas, buscando entender las condiciones en las que la complejidad produce

  16. Water security at local government level in South Africa: a qualitative interview-based analysis

    Directory of Open Access Journals (Sweden)

    Richard Meissner, DPhil

    2018-05-01

    individuals and their natural surroundings. We discovered that perceptions depend on many different factors. First, the changing state of the natural environment a person lives in—eg, one respondent from eThekwini said “When it rains in summer a lot of stuff gets washed down into the storm water drains and into the sea. The main concern here is pathogens.” Second, socioeconomic status is important—one community member in Ntshongweni noted that only some community members have the financial means to buy water tanks for rain harvesting to enhance their household water security. Third, experiences relating to various interactions with local governments and members of the community can also affect perceptions—eg, some respondents were unsatisfied with responses to problems by local authorities. A respondent from eThekwini said “Sometimes when we report water leakages it takes a long time for them to get fixed”, and a respondent from Sekhukhune said “Sometimes we have asked the authorities about the problem of water supply cuts, they told us about a stolen water pump and gave us inconsistent answers”. Therefore, a changing natural environment, like flooding and drought, is not the only variable that influences water security perceptions; such conceptualisations also depend to varying degrees on interpersonal relationships (eg, with local authorities and practices (eg, collecting rainwater, which are directly or indirectly related to water security enhancement. Interpretation: How people perceive water security has policy implications at the local government level in South Africa and further afield in other low-income and middle-income countries where data collection is unreliable. We established that people from diverse lifestyles hold various understandings and interpretations of water security relating mainly to the availability, access, and quality of water resources. Understanding how people perceive water security in specific localities could aid policy

  17. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  18. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  19. 31 CFR 357.10 - Laws governing a Treasury book-entry security, TRADES, and security interests or entitlements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Laws governing a Treasury book-entry... PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY TREASURY BONDS, NOTES AND BILLS HELD IN LEGACY TREASURY DIRECT Treasury/Reserve Automated Debt Entry System (TRADES) § 357.10 Laws governing a Treasury book...

  20. 17 CFR 240.3a44-1 - Proprietary government securities transactions incidental to the futures-related business of a...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Proprietary government securities transactions incidental to the futures-related business of a CFTC-regulated person. 240.3a44-1 Section 240.3a44-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  1. Markets: State Franchise Laws, Dealer Terminations, and the Auto Crisis

    OpenAIRE

    Francine Lafontaine; Fiona Scott Morton

    2010-01-01

    In fall 2008, General Motors and Chrysler were both on the brink of bankruptcy, and Ford was not far behind. As the government stepped in and restructuring began, GM and Chrysler announced their plan to terminate about 2,200 dealerships. In this paper, we first provide an overview of franchising in car distribution, how it came about, and the legal framework within which it functions. States earn about 20 percent of all state sales taxes from auto dealers. As a result, new car dealerships, an...

  2. Hawaii DAR Dealer Reporting System Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — In 2000 January, the Hawaii Division of Aquatic Resources (DAR) implemented a computerized data processing system for fish dealer data collected state-wide. Hawaii...

  3. 40 CFR 85.2108 - Dealer certification.

    Science.gov (United States)

    2010-07-01

    ... representation or a warranty, express or implied, by the dealer that the emission control system or any part... emission performance warranty. (c) For the purpose of this section, the term emission control devices shall...

  4. Dealer Inventory and the Cost of Immediacy

    DEFF Research Database (Denmark)

    Dick-Nielsen, Jens

    This study shows that the recent 80% decrease in dealer inventories of corporate bonds has increased the cost of immediacy. For safe bonds which are quickly turned over again by dealers the increase is up to 15%, while for risky bonds which are kept on inventory by dealers the increase is up to 100......% on average. The time series of transaction costs is estimated using the natural experiment of corporate bond index exclusions. The exclusions are monthly and information-free events where index trackers seeking to minimize tracking error request immediacy in order to sell close to the exclusion date....... The drop in dealer inventories, and thus the rise in transaction costs, is a side-eect of anticipated tighter regulation, primarily Basel III and the Volcker Rule....

  5. Environmental tobacco smoke exposure among casino dealers.

    Science.gov (United States)

    Achutan, Chandran; West, Christine; Mueller, Charles; Bernert, John T; Bernard, Bruce

    2011-04-01

    This study quantified casino dealers' occupational exposure to environmental tobacco smoke (ETS). We measured casino dealers' exposure to ETS components by analyzing full-shift air and preshift and postshift urine samples. Casino dealers were exposed to nicotine, 4-vinyl pyridine, benzene, toluene, naphthalene, formaldehyde, acetaldehyde, solanesol, and respirable suspended particulates. Levels of 4-(methylnitrosamino)-1-(3-pyridyl)-1-butanol (NNAL) in urine increased significantly during an 8-hour work shift both with and without adjustment for creatinine clearance. Creatinine-unadjusted cotinine significantly increased during the 8-hour shift, but creatinine-adjusted cotinine did not increase significantly. Casino dealers at the three casinos were exposed to airborne ETS components and absorbed an ETS-specific component into their bodies, as demonstrated by detectable levels of urinary NNAL. The casinos should ban smoking on their premises and offer employee smoking cessation programs.

  6. Commercial Landings Monitoring Reports (Coastal Dealers)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains pounds and value for all seafood products that are landed and sold by established seafood dealers and brokers in the SE Region of the US...

  7. 27 CFR 11.39 - Seasonal dealers.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS CONSIGNMENT SALES Rules for the Return of Distilled Spirits, Wine, and Malt Beverages Exchanges and Returns for Ordinary and Usual Commercial Reasons § 11.39 Seasonal dealers. Industry...

  8. Major dealers' expert power in distribution channels

    OpenAIRE

    Richard Chinomona; Marius Pretorius

    2011-01-01

    The importance of major dealers' expertise in distribution channels and effects on exchange relations is widely acknowledged by many SMEs in Africa and yet there seem to be a paucity of research on this matter. To address this dearth, the current study attempts to examine the relationship between major dealers' expert power and SME manufacturers' channel cooperation and the mediating influence of their trust, relationship commitment and satisfaction. The conceptualized model and five hypothes...

  9. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  10. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches  of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  11. Beyond job security and money: driving factors of motivation for government doctors in India.

    Science.gov (United States)

    Purohit, Bhaskar; Bandyopadhyay, Tathagata

    2014-02-21

    Despite many efforts from government to address the shortage of medical officers (MOs) in rural areas, rural health centres continue to suffer from severe shortage of MOs. Lack of motivation to join and continue service in rural areas is a major reason for such shortage. In the present study, we aimed to assess and rank the driving factors of motivation important for in-service MOs in their current job. The study participants included ninety two in-service government MOs from three states in India. The study participants were required to rank 14 factors of motivation important for them in their current job. The factors for the study were selected using Herzberg's two-factor theory of motivation and the data were collected using an instrument that has an established reliability and validity. Test of Kendall's coefficient of concordance (W) was carried out to assess the agreement in ranks assigned by participants to various motivation factors. Next, we studied the distributions of ranks of different motivating factors using standard descriptive statistics and box plots, which gave us interesting insights into the strength of agreement of the MOs in assigning ranks to various factors. And finally to assess whether MOs are more intrinsically motivated or extrinsically motivated, we used Kolmogorov-Smirnov test. The (W) test indicated statistically significant (P factors than to extrinsic factors. The study results indicate that job security was the most important factor related to motivation, closely followed by interesting work and respect and recognition. Among the top five preferred factors, three were intrinsic factors indicating a great importance given by MOs to factors beyond money and job security. To address the issue of motivation, the health departments need to pay close attention to devising management strategies that address not only extrinsic but also intrinsic factors of motivation. The study results may be useful to understand the complicated issue of

  12. Dependence of the number of dealers in a stochastic dealer model

    Science.gov (United States)

    Yamada, Kenta; Takayasu, Hideki; Takayasu, Misako

    2010-04-01

    We numerically analyze an artificial market model consisted of N dealers with time dependent stochastic strategy. Observing the change of market price statistics for different values of N, it is shown that the statistical properties are almost same when the dealer number is larger than about 30.

  13. BASIS FOR THE DEVELOPMENT OF THE LIQUIDITY OF THE GOVERNMENT SECURITIES MARKET IN THE REPUBLIC OF MOLDOVA

    Directory of Open Access Journals (Sweden)

    Victoria COCIUG

    2018-02-01

    Full Text Available The unilateral structure of the domestic financial market, monopolized by banking institutions,requires a major reconfiguration by returning to representative positions of the capital market. Thisrestructuring can be initiated by increasing investors' interest in the government securities market, givingit some quality elements, but also by creating a trading system that would increase the liquidity of allsecurities on the capital market. Increasing the quality of the GS market would allow the government on theone hand, to diversify its funding sources and manage its most important market risks more effectively, andon the other hand the financial sector would create opportunities for it to correlate and synchronize thedevelopment of the GS market with other segments of the capital market. In order to identify prerequisitesfor the development of the GS market in the RM, using the methods of research analysis, synthesis anddeduction, we initially sought to identify the characteristics that define a market of government securitiesas a qualitative one. A comparative analysis of the historical evolution of government securities markets,which can be considered representative for the Republic of Moldova, can provide the necessary experiencefor the improvement of the liquidity level of the domestic government securities market. The results of thisresearch have identified several possible actions, the implementation of which could lead to an increase inthe quality of the domestic GS market.

  14. Water security at local government level in South Africa: a qualitative interview-based analysis

    CSIR Research Space (South Africa)

    Meissner, Richard

    2018-05-01

    Full Text Available understanding of water security exists. The aim of this study was to research, using qualitative social scientific methods, how people in two South African localities understand water security....

  15. 49 CFR 599.200 - Registration of participating dealers.

    Science.gov (United States)

    2010-10-01

    ... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REQUIREMENTS AND PROCEDURES FOR... franchise agreement to sell new automobiles with an original equipment manufacturer of automobiles; (4) A...) Dealer's Federal Tax Identification Number (TIN) and OEM assigned dealer franchise number; (ii) Legal...

  16. 9 CFR 2.75 - Records: Dealers and exhibitors.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.75 Records: Dealers and exhibitors. (a)(1) Each dealer... breed or type; (B) The sex; (C) The date of birth or approximate age; and (D) The color and any...

  17. 17 CFR 240.3a43-1 - Customer-related government securities activities incidental to the futures-related business of a...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer-related government securities activities incidental to the futures-related business of a futures commission merchant registered with the Commodity Futures Trading Commission. 240.3a43-1 Section 240.3a43-1 Commodity and Securities...

  18. 27 CFR 20.176 - Packaging by a dealer.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Packaging by a dealer. 20.176 Section 20.176 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU... and Users of Specially Denatured Spirits Operations by Dealers § 20.176 Packaging by a dealer. A...

  19. 75 FR 70061 - Dealer Floor Plan Pilot Program Meeting

    Science.gov (United States)

    2010-11-16

    ... SMALL BUSINESS ADMINISTRATION Dealer Floor Plan Pilot Program Meeting AGENCY: U.S. Small Business... location, date, time, and agenda for a meeting regarding the Dealer Floor Plan Pilot Program established in the Small Business Jobs Act of 2010. The meeting will be open to the public. DATES: The Dealer Floor...

  20. 49 CFR 574.9 - Requirements for motor vehicle dealers.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Requirements for motor vehicle dealers. 574.9... RECORDKEEPING § 574.9 Requirements for motor vehicle dealers. (a) Each motor vehicle dealer who sells a used motor vehicle for purposes other than resale, who leases a motor vehicle for more than 60 days, that is...

  1. 12 CFR 221.125 - Credit to brokers and dealers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Credit to brokers and dealers. 221.125 Section... SYSTEM CREDIT BY BANKS AND PERSONS OTHER THAN BROKERS OR DEALERS FOR THE PURPOSE OF PURCHASING OR CARRYING MARGIN STOCK (REGULATION U) Interpretations § 221.125 Credit to brokers and dealers. (a) The...

  2. 12 CFR 221.103 - Loans to brokers or dealers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Loans to brokers or dealers. 221.103 Section... SYSTEM CREDIT BY BANKS AND PERSONS OTHER THAN BROKERS OR DEALERS FOR THE PURPOSE OF PURCHASING OR CARRYING MARGIN STOCK (REGULATION U) Interpretations § 221.103 Loans to brokers or dealers. Questions have...

  3. Security Cooperation Activities: Strengthening a Partner Military and its Governing Institutions

    Science.gov (United States)

    2016-05-26

    governments suffered from economic instability , corruption, poor rule of law, and low administration of justice. Government and economic stability ...types of programs applied. Conditions defining allied state characteristics are military structure, government polity rating, and economic stability ...regional instability . Dr. Michael Mihalka and Mr. Mark Wilcox covered the trends in liberal democracy in the South Caucasus in light of economic

  4. Reframing governance, security and conflict in the light of HIV/AIDS: a synthesis of findings from the AIDS, Security and Conflict Initiative.

    Science.gov (United States)

    de Waal, Alex

    2010-01-01

    This paper draws upon the findings of the AIDS, Security and Conflict Initiative (ASCI) to reach conclusions about the relationship between HIV/AIDS, security, conflict and governance, in the areas of HIV/AIDS and state fragility, the reciprocal interactions between armed conflicts (including post-conflict transitions) and HIV/AIDS, and the impact of HIV/AIDS on uniformed services and their operational effectiveness. Gender issues cut across all elements of the research agenda. ASCI commissioned 29 research projects across regions, disciplines and communities of practice. Over the last decade, approaches to HIV/AIDS as a security threat have altered dramatically, from the early anticipation that the epidemic posed a threat to the basic functioning of states and security institutions, to a more sanguine assessment that the impacts will be less severe than feared. ASCI finds that governance outcomes have been shaped as much by the perception of HIV/AIDS as a security threat, as the actual impacts of the epidemic. ASCI research found that the current indices of fragility at country level did not demonstrate any significant association with HIV, calling into question the models used for asserting such linkages. However at local government level, appreciable impacts can be seen. Evidence from ASCI and elsewhere indicates that conventional indicators of conflict, including the definition of when it ends, fail to capture the social traumas associated with violent disruption and their implications for HIV. Policy frameworks adopted for political and security reasons translate poorly into social and public health policies. Fears of much-elevated HIV rates among soldiers with disastrous impacts on armies as institutions, have been overstated. In mature epidemics, rates of infection among the military resemble those of the peer groups within the general population. Military HIV/AIDS control policies follow a different and parallel paradigm to national (civilian) policies, in

  5. MARITIME SECURITY GOVERNANCE IN THE FIGHT AGAINST PIRACY OFF THE COAST OF SOMALIA: A FOCUS ON THE EU RESPONSE

    Directory of Open Access Journals (Sweden)

    Alexandru VOICU

    2015-10-01

    Full Text Available Although currently on a declining trend, large scale piracy off the coast of Somalia cannot be safely dismissed as a thing of the past: since the mid-2000s, piracy in the Western Indian Ocean has put in peril the international and regional security. Maritime threats are interdependent, asymmetric, persistent, shifting and generated by manifold and mutually-reinforcing root causes, hence their high probability of recurrence or relocation in the absence of a generally improved and self-sustaining security environment. Confronted with these complex challenges, numerous state and non-state actors have taken steps to prevent, mitigate or suppress piracy off the Somali coast. Within the security governance framework, the present paper outlines the major actors activating in the counter-piracy field in the region and their specific responses, focusing on the comprehensive measures undertaken by the EU in this realm.

  6. Water security in Southern Africa: Discourses securitising water and the implications for water governance and politics

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-01-01

    Full Text Available In the South African water discourse, the water security concept is a complex notion that not only covers the quantitative aspects of water demand and supply but is also linked to national security and political stability, as well as human well...

  7. 76 FR 37571 - Broker-Dealer Reports

    Science.gov (United States)

    2011-06-27

    ... ``review'' and appropriate tests of the broker-dealer's accounting system, internal accounting control and... further states that the scope of the audit and review of the accounting system, internal accounting... Accounting Oversight Board (the ``PCAOB'') to implement oversight of independent public accountants of broker...

  8. 78 FR 51909 - Broker-Dealer Reports

    Science.gov (United States)

    2013-08-21

    ...-dealer's independent public accountant and to allow the accountant to discuss the findings relating to.... PCAOB Registration of Independent Public Accountant-- Paragraph (f)(1) of Rule 17a-5 F. Notification of... (c) of Rule 17a- 5 i. Background ii. Availability of Independent Public Accountant's Comments on...

  9. Privacy, Security, and Patient Engagement: The Changing Health Data Governance Landscape.

    Science.gov (United States)

    Holmes, John H

    2016-01-01

    The rapid emergence of new technologies support collection and use of a wide variety of data from clinical, genomic, social and behavioral, environmental, and financial sources, and have a great impact on the governance of personal health information. The papers in this special issue on governance touch on the topic from a variety of focuses, including leadership perspectives, local and federal case studies, and the future importance of patient engagement. This special issue focuses on three major themes-that data governance is growing in importance and presenting new challenges that must be addressed, that health care organizations must prioritize governance design, implementation, and functions as a priority, and that governance seems to be naturally converging on an archetype as described by this set of papers. In order to deal with issues such as data de- and re-identification, data governance must be studied as its own field.

  10. 17 CFR 249.507 - Form 7-M, consent to service of process by an individual nonresident broker-dealer.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 7-M, consent to service of process by an individual nonresident broker-dealer. 249.507 Section 249.507 Commodity and... Forms for Statements Made in Connection With Exempt Tender Offers § 249.507 Form 7-M, consent to service...

  11. 17 CFR 249.509 - Form 9-M, consent to service of process by a partnership nonresident broker-dealer.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 9-M, consent to service of process by a partnership nonresident broker-dealer. 249.509 Section 249.509 Commodity and... Forms for Statements Made in Connection With Exempt Tender Offers § 249.509 Form 9-M, consent to service...

  12. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... officials say they are not sure the effort is "winning." These assessments emphasize a growing sense of insecurity in areas around Kabul previously considered secure, and increased numbers of civilian and military deaths...

  13. Seed governance. From seed aid to seed system security in fragile areas

    NARCIS (Netherlands)

    Rietberg, P.I.; Gevers, H.; Hospes, O.

    2014-01-01

    Intergovernmental agencies and development organizations, including Cordaid, consider interventions directed at seed security of utmost importance to support smallholders recovering from conflict situations and disasters, and to contribute to revitalisation of local agricultural production and food

  14. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... Both the official U.S. as well as outside assessments increasingly point to Pakistan's failure to prevent Taliban and other militant infiltration into Afghanistan as a cause of the security deterioration...

  15. Governing humanitarian emergencies, protracted crises, and (in)security through resilience

    NARCIS (Netherlands)

    Anholt, Rosanne

    2017-01-01

    ‘Resilience’ occupies a prominent place in contemporary discussions around the governance of humanitarian emergencies, protracted crises and insecurity more broadly. The aim of this study was to further our understanding of resilience as a governance rationality and a policy discourse, in particular

  16. Strategies for a risky business: How drug dealers manage customers, suppliers and competitors in Italy, Slovenia and Germany.

    Science.gov (United States)

    Tzvetkova, Marina; Pardal, Mafalda; Disley, Emma; Rena, Alice; Talic, Sanela; Forberger, Sarah

    2016-05-01

    the day-to-day operational concerns and modes of relationship management. Interviewees' arrangements for securing supplies of drugs provide support to the notion that drug markets are resilient and flexible. Our findings correspond with other empirical research in relation to the centrality of trust in the practical operation of supply and sale of drugs. The research highlights some differences, but important similarities between dealers who were part of organised crime groups and those who were not; dealers all faced some common challenges and adopted some common responses to these. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2007-01-01

    Afghanistan's political transition was completed with the convening of a parliament in December 2005, but in 2006 insurgent threats to Afghanistan's government escalated to the point that some experts...

  18. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2004-01-01

    ....-led war that brought the current government to power. Before the U.S. military campaign against the Taliban began on October 7, 2001, Afghanistan had been mired in conflict since the Soviet invasion of Afghanistan in 1979...

  19. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    Afghanistan's planned political transition was completed with the convening of a parliament in December 2005, but insurgent threats to Afghanistan s government persist and are even growing in some southern provinces...

  20. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2007-01-01

    Assessments of the U.S. effort to stabilize Afghanistan are mixed. The political transition was completed with the convening of a parliament in December 2005, but since 2006 insurgent threats to Afghanistan's government have escalated...

  1. A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE DEVELOPMENT

    OpenAIRE

    Steve Harrison; Antonis Tzounis; Leandros Maglaras; Francois Siewe; Richard Smith; Helge Janicke

    2016-01-01

    This is an Open Access article This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been used for several years. We discuss the pros and cons of Waterfall before moving onto the Agile Scrum methodology. Agile has been adopted by the majority of Government digital departments including the Gover...

  2. 17 CFR 240.15c3-1f - Optional market and credit risk requirements for OTC derivatives dealers (Appendix F to 17 CFR...

    Science.gov (United States)

    2010-04-01

    ... charges for market and credit risk pursuant to this Appendix F in lieu of computing securities haircuts...)(2)(vi). Credit Risk (d) The capital charge for credit risk arising from an OTC derivatives dealer's... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Optional market and credit...

  3. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    Science.gov (United States)

    2018-03-01

    employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and human security. This study also...security to the principal who employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and...Uzbek forces, the United States and its allied partners momentarily destroyed most of the al Qaeda operatives in Afghanistan while simultaneously

  4. 77 FR 33634 - U.S. Treasury Securities-State and Local Government Series

    Science.gov (United States)

    2012-06-07

    ... available for purchase by issuers of tax-exempt securities. Current financial market conditions have... Commissioner for Public Debt Accounting, Bureau of the Public Debt, at (304) 480-5101 or [email protected] the SLGS rate table. Interest is accrued and added to the principal daily. Interest is computed on the...

  5. 7 CFR 1955.15 - Foreclosure by the Government of loans secured by real estate.

    Science.gov (United States)

    2010-01-01

    ... problem case report is prepared. This action should eliminate delays in selling the property after... of hazardous substances on the property. (2) Acceleration of account. Subject to paragraphs (d)(2)(i... chattel). (2) If the borrower is in the process of selling security or nonsecurity, payments may be...

  6. Food governance transformation : aligning food security with sustainable farming practices in developing communities

    NARCIS (Netherlands)

    Otsuki, K.

    2014-01-01

    Conventional approaches used to improve farming practices and access to food in developing communities are underpinned by policy, technology, and the science of modernization. The focus has been on securing a sufficient quantity of food derived from extensive monocultures. This quantity focus is

  7. 76 FR 59592 - Government Securities Act Regulations; Replacement of References to Credit Ratings and Technical...

    Science.gov (United States)

    2011-09-27

    ... creditworthiness of a security or money market instrument; and (2) any references to or requirements in such... or gross short position in money market instruments qualifying as Treasury market risk instruments...), that mature in 45 days or more, settled on a cash or delivery basis. Money market instruments...

  8. Who Acquires Information in Dealer Markets?

    DEFF Research Database (Denmark)

    Rudiger, Jesper; Vigier, Adrien

    2017-01-01

    We study information acquisition in dealer markets. We first identify a one-sided strategic complementarity in information acquisition: the more informed traders are, the larger market makers' gain from becoming informed. We then fully characterize the unique equilibrium as a function...... of the (uniform) cost of information, and the composition of the market in terms of liquidity traders and speculators. Lastly, we examine the implications of our analysis for market liquidity and price discovery. Our findings shed light on several empirical regularities....

  9. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  10. Good governance and virtue in South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, O

    2015-01-01

    Full Text Available Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack...

  11. The Role of Corporate and Government Surveillance in Shifting Journalistic Information Security Practices

    Science.gov (United States)

    Shelton, Martin L.

    2015-01-01

    Digital technologies have fundamentally altered how journalists communicate with their sources, enabling them to exchange information through social media as well as video, audio, and text chat. Simultaneously, journalists are increasingly concerned with corporate and government surveillance as a threat to their ability to speak with sources in…

  12. Governing in the space of the "Seam" : Airport security after the liquid bomb plot

    NARCIS (Netherlands)

    Hoijtink, M.

    This paper provides a detailed study of the liquid bomb plot from 2006, focusing on the ways in which the plot was constituted as “an event unlike others” (Adey, Anderson, and Lobo Guerrero 2011, 340). Engaging with a critical body of scholarship that examines how events are assembled and governed

  13. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-06-06

    Security Council Resolution 1193 (August 28, 1998) and 1214 (December 8, 1998) urged the Taliban to end discrimination against women . Women’s rights ...powers to compensate. Gives men and women equal rights under the law, allows for political parties as long as they are not “un-Islamic;” allows for...implement the NAPWA and all of its past commitments and laws to strengthen the rights of women and provide services to them. The major institutional

  14. Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment

    OpenAIRE

    Nitin Bakshi; Noah Gans

    2010-01-01

    To mitigate the threat that terrorists smuggle weapons of mass destruction into the United States through maritime containers, the U.S. Bureau of Customs and Border Protection (CBP) inspects containers upon entry to domestic ports. Inspection-driven congestion is costly, and CBP provides incentives to firms to improve security upstream in the supply chain, thereby reducing the inspection burden at U.S. ports. We perform an economic analysis of this incentive program, called Customs-Trade Part...

  15. Retrofitting tractors with rollover protective structures: perspective of equipment dealers.

    Science.gov (United States)

    Tonelli, S M; Donham, K J; Leedom-Larson, K; Sanderson, W; Purschwitz, M

    2009-10-01

    This study was one of a cluster of studies that originated via requests for proposals from the NIOSH National Agricultural Tractor Safety Initiative. The present study design consisted of several steps: (1) formation of an advisory group, (2) development and testing of a standard paper self-responding survey instrument, (3) sample selection of farm equipment dealers, (4) administration of the survey, (5) assessment and analysis of the survey, and (6) in-person response panel of dealers (n = 80) to review results of the questionnaire for further definition and sharpening of the recommendations from the survey. A key finding is that most dealers do not currently sell or install ROPS retrofit kits. Barriers cited by dealers included (1) actual or perceived lack of farmer demand, (2) injury liability, (3) expensive freight for ordering ROPS, (4) lack of dealer awareness of the magnitude of deaths from tractor overturns and the high life-protective factor of ROPS, and (5) difficulty and incursion of non-recoverable expenses in locating and obtaining specific ROPS. Despite not currently selling or installing ROPS, dealers responded favorably about their future potential role in ROPS promotion and sales. Dealers were willing to further promote, sell, and install ROPS if there was demand from farmers. Recommendations include establishing a ROPS "clearing house" that dealers could contact to facilitate locating and obtaining ROPS orders from customers. Additional recommendations include education and social marketing targeting farm machinery dealers as well farmers, manufacturers, and policy makers.

  16. Bouncers, Policing and the (Invisibility of Ethnicity in Nightlife Security Governance

    Directory of Open Access Journals (Sweden)

    Thomas Friis Søgaard

    2014-09-01

    Full Text Available This article explores the reproduction of ethnified urban spaces and inequalities in an ostensibly cosmopolitan city. It does so by means of a case study of bouncers’ policing practices in the nightlife of the Danish city, Aarhus. In recent years, a substantial body of research has explored the regulatory practices of bouncers operating in the urban night-time economy. This article contributes to the study of nightlife policing by paying special attention to the ethnic governance of bouncers. More specifically, the article investigates how ethnicity is produced in bouncers’ administration of nightlife accessibility; how inclusion and exclusion are negotiated in encounters between bouncers and ethnic minority youth; and how bouncers struggle to avoid allegations of discrimination and to uphold notions of colorblind good governance, while ethnified notions of troublesome individuals continue to inform bouncers’ production of nightlife safety.

  17. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-11-08

    did occasionally meet foreign officials. The Taliban lost international and domestic support as it imposed strict adherence to Islamic customs in...shows since 2011. Because of the power of Islamist conservatives, alcohol is increasingly difficult to obtain in restaurants and stores, although it...districts) and influenced or operated in another 30%, and tribes and local groups with varying degrees of loyalty to the central government

  18. The regulatory system governing liability, financial security, and the funding of decommissioning

    International Nuclear Information System (INIS)

    Pelzer, N.

    1991-01-01

    Principally speaking, the nuclear liability law and the law on financial security constitute a modern system determining indemnification for nuclear damage with due regard to the risks concerned. This holds especially since the introduction of the unlimited financial liability of the owner. The question as to the security through available financial means is of foremost importance: at present the German insurance market can cover up to 500 million DM, another 500 million DM could be provided by a civil-law nuclear liability insurance company; thus the proposal to raise private provision finds to 1 billion DM. Indemnification through the state could consist in a loan for the liable party. As yet there is no obligation under atomic energy law to make provisions for the decommissioning of nuclear installations. Even if negotiations with the industry lead to satisfactory results, a legislative bridge, i.e. regularization through law, is not wholly dispensable and can be realized in various ways: as a precondition for the issue of a licence or as a specific obligation of the operator under atomic energy law. (orig./HSCH) [de

  19. Non-state security governances and the implications for local-level citizenship in Danish semi-public city spaces

    DEFF Research Database (Denmark)

    Jensen, Thomas Søgaard

    directed at promoting peace and restoring the feel good factor - in public city space in Denmark. What precisely "security" is, what it should mean, and what should be done to guarantee it, has always been contested on an empirically level. The reason for this is that security often deals with social order......, being both the ontological condition of order, in the sense of absence of "real" and culturally constructed dangers, risks, and anxieties, and the political means to ensure this order. Based on a 5 month ethnographic field work among private security guards policing new kinds of public city spaces...... the globalisation and privatisation/commercialisation of security provision and how this development can be explained. Drawing on my own empirical data I hereafter argue that commercial security governance and local understandings of threats to (feelings of) security are not so much shaped by imaginaries...

  20. 27 CFR 31.33 - Retail dealer in beer.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Retail dealer in beer. 31... Classified § 31.33 Retail dealer in beer. (a) General. Except as otherwise provided in paragraph (b) of this section, every person who sells or offers for sale beer, but not distilled spirits or wines, to any person...

  1. 27 CFR 31.34 - Wholesale dealer in beer.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Wholesale dealer in beer... Classified § 31.34 Wholesale dealer in beer. (a) General. Except as otherwise provided in paragraph (b) of this section, every person who sells or offers for sale beer, but not distilled spirits or wines, to...

  2. 78 FR 14848 - Duties of Brokers, Dealers, and Investment Advisers

    Science.gov (United States)

    2013-03-07

    ... of 1940 (``Advisers Act'') is largely principles-based. In contrast, a broker-dealer is not uniformly... interest\\21\\ and disclosure practices of investment advisers and broker-dealers, as well as the economics... Parts III and IV below, we request data and other information relating to the economics and...

  3. 76 FR 7098 - Dealer Floor Plan Pilot Program

    Science.gov (United States)

    2011-02-09

    ... Plan Pilot Program AGENCY: U.S. Small Business Administration (SBA). ACTION: Program implementation with request for comments. SUMMARY: SBA is introducing a new Dealer Floor Plan Pilot Program to make... Plan Pilot Program was created in the Small Business Jobs Act of 2010. Under the new Dealer Floor Plan...

  4. 12 CFR 220.132 - Credit to brokers and dealers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Credit to brokers and dealers. 220.132 Section 220.132 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CREDIT BY BROKERS AND DEALERS (REGULATION T) Interpretations § 220.132 Credit to brokers and...

  5. Solvable stochastic dealer models for financial markets

    Science.gov (United States)

    Yamada, Kenta; Takayasu, Hideki; Ito, Takatoshi; Takayasu, Misako

    2009-05-01

    We introduce solvable stochastic dealer models, which can reproduce basic empirical laws of financial markets such as the power law of price change. Starting from the simplest model that is almost equivalent to a Poisson random noise generator, the model becomes fairly realistic by adding only two effects: the self-modulation of transaction intervals and a forecasting tendency, which uses a moving average of the latest market price changes. Based on the present microscopic model of markets, we find a quantitative relation with market potential forces, which have recently been discovered in the study of market price modeling based on random walks.

  6. EVALUATION OF THE GOVERNANCE OF EXTERNAL SUPERVISORY INSTITUTIONS TOWARDS SOCIAL SECURITY AGENCY (BADAN PENYELENGGARA JAMINAN SOSIAL/BPJS FOR HEALTHCARE

    Directory of Open Access Journals (Sweden)

    Dyani D.A.M.

    2017-09-01

    Full Text Available Since the formation of the Social Security Agency (Badan Penyelenggara Jaminan Sosial/BPJS for Healthcare has found the public spotlight rising with its management; including the regulatory body BPJS for Healthcare activities. BPJS for Healthcare external supervisors such as DJSN, OJK, BPK are entities established according to the Law of the Republic of Indonesia 24 Year 2011. However, there are views on neutrality, independence, and supervisor capability. By using Soft System Methodology, this research invites us to understand the problem situation and what efforts should be taken in managing the complexity. This paper will analyze the co-operation with collaborative governance perspective as a cooperative approach in overseeing BPJS for Healthcare. The focus of this paper is in the stage of identifying a series of factors that are crucial within the collaborative process itself, which includes shared understanding as stated by Ansel & Gash (2008 and Emerson & Nabatchi (2015.

  7. Emerging Roles of Women in the National Food Security Campaign of the Federal Government of Nigeria: A Review

    OpenAIRE

    Ademilua, O.S; Adeeko, A; Gbotoso, O.A; Akomolafe, A.M; Ishola, O.O

    2017-01-01

    The issue of food security in Nigeria is of national concern as it affects young and old, male and female. The review assessed the emerging roles of women and their contributions to food security in Nigeria. Specifically, it explained the concept of food security, identified the specific roles of women in food security and identified factors affecting women participation in national food security. Food security is a situation that exist when all people at all times, have physical, social and ...

  8. The Governmentality of Meta-governance : Identifying Theoretical and Empirical Challenges of Network Governance in the Political Field of Security and Beyond

    OpenAIRE

    Larsson, Oscar

    2015-01-01

    Meta-governance recently emerged in the field of governance as a new approach which claims that its use enables modern states to overcome problems associated with network governance. This thesis shares the view that networks are an important feature of contemporary politics which must be taken seriously, but it also maintains that networks pose substantial analytical and political challenges. It proceeds to investigate the potential possibilities and problems associated with meta-governance o...

  9. 17 CFR 240.15b1-5 - Consent to service of process to be furnished by nonresident brokers or dealers and by...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... § 240.15b1-5 Consent to service of process to be furnished by nonresident brokers or dealers and by...) stipulates and agrees that any such civil suit or action may be commended by the service of process upon the...

  10. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership status of any of...

  11. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Science.gov (United States)

    2010-04-01

    ... authorization determinations by national securities exchanges and associations. 240.19c-4 Section 240.19c-4... determinations by national securities exchanges and associations. (a) The rules of each exchange shall provide as... national securities exchange, registered as such with the Securities and Exchange Commission pursuant to...

  12. Leadership, Governance

    Science.gov (United States)

    : Environmental Documents, Reports LANL Home Calendar Search Contacts About » Leadership, Governance Leadership national security and energy challenges. Leadership, Governance Ethics, Accountability Los Alamos National . Director's Office terry wallace in leadership, governance Director Terry C. Wallace, Jr. Terry C. Wallace, Jr

  13. 2009 Survey of Gulf of Mexico Dockside Seafood Dealers

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This survey employed a two page, self-administered mail survey structured to collect economic and financial information from dockside seafood dealers who operated...

  14. 9 CFR 201.94 - Information as to business; furnishing of by packers, swine contractors, live poultry dealers...

    Science.gov (United States)

    2010-01-01

    ... of by packers, swine contractors, live poultry dealers, stockyard owners, market agencies, and... poultry dealers, stockyard owners, market agencies, and dealers. Each packer, swine contractor, live poultry dealer, stockyard owner, market agency, and dealer, upon proper request, shall give to the...

  15. 17 CFR 249.501a - Form BDW, notice of withdrawal from registration as broker-dealer pursuant to § 240.15b6-1, § 240...

    Science.gov (United States)

    2010-04-01

    ... withdrawal, except for social security account numbers, disclosure of which is voluntary. The information... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form BDW, notice of withdrawal... Offers § 249.501a Form BDW, notice of withdrawal from registration as broker-dealer pursuant to § 240...

  16. The grounds for time dependent market potentials from dealers' dynamics

    Science.gov (United States)

    Yamada, K.; Takayasu, H.; Takayasu, M.

    2008-06-01

    We apply the potential force estimation method to artificial time series of market price produced by a deterministic dealer model. We find that dealers’ feedback of linear prediction of market price based on the latest mean price changes plays the central role in the market’s potential force. When markets are dominated by dealers with positive feedback the resulting potential force is repulsive, while the effect of negative feedback enhances the attractive potential force.

  17. Water security at local government level: what do people think it means in eThekwini? Ntshongweni Community feedback

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-12-01

    Full Text Available defined by international organisations or scientists, like UN Water. • Water security is NOT about quantity, quality, availability, reliable supply, water borne diseases… • Water security is about individuals, and their environment—lived experience...

  18. 12 CFR 703.11 - Valuing securities.

    Science.gov (United States)

    2010-01-01

    ... credit union must obtain either price quotations on the security from at least two broker-dealers or a price quotation on the security from an industry-recognized information provider. This requirement to obtain price quotations does not apply to new issues purchased at par or at original issue discount. (b...

  19. Investigating Food and Agribusiness Corporations as Global Water Security, Management and Governance Agents: The case of Nestlé, Bunge and Cargill

    Directory of Open Access Journals (Sweden)

    Suvi Sojamo

    2012-10-01

    Full Text Available This article investigates the agency of the world’s largest food and agribusiness corporations in global water security via case studies of Nestlé, Bunge and Cargill by analysing their position in the political economy of the world agro-food system and the ways they intentionally and non-intentionally manage and govern water in their value chains and wider networks of influence. The concentrated power of a few corporations in global agro-food value chains and their ability to influence the agro-food market dynamics and networks throughout the world pose asymmetric conditions for reaching not only global food security but also water security. The article will analyse the different forms of power exercised by the corporations in focus in relation to global water security and the emerging transnational water governance regime, and the extent to which their value chain position and stakeholder interaction reflect or drive their actions. Due to their vast infrastructural and technological capacity and major role in the global agro-food political economy, food and agribusiness corporations cannot avoid increasingly engaging, for endogenous and exogenous reasons, in multi-stakeholder initiatives and partnerships to devise methods of managing the agro-food value chains and markets to promote global water security. However, their asymmetric position in relation to their stakeholders demands continuous scrutiny.

  20. International Food Security: Insufficient Efforts by Host Governments and Donors Threaten Progress to Halve Hunger in Sub-Saharan Africa by 2015

    Science.gov (United States)

    2008-05-01

    AIDS human immunodeficiency virus/acquired immune deficiency syndrome IEHA Initiative to End Hunger in Africa (A U.S. Presidential Initiative...term agricultural development have not been successful. The United States’ Presidential Initiative to End Hunger in Africa ( IEHA ...Africa, but these efforts are not integrated into IEHA . Given this fragmented approach to food security, the U.S. government is likely missing

  1. Romanian government bond market

    Directory of Open Access Journals (Sweden)

    Cornelia POP

    2012-12-01

    Full Text Available The present paper aims to present the level of development reached by Romanian government bond market segment, as part of the country financial market. The analysis will be descriptive (the data series available for Romania are short, based on the secondary data offered by the official bodies involved in the process of issuing and trading the Romanian government bonds (Romanian Ministry of Public Finance, Romanian National Bank and Bucharest Stock Exchange, and also on secondary data provided by the Federation of European Stock Exchanges.To enhance the market credibility as a benchmark, a various combination of measures is necessary; among these measures are mentioned: the extension of the yield curve; the issuance calendars in order to improve transparency; increasing the disclosure of information on public debt issuance and statistics; holding regular meetings with dealers, institutional investors and rating agencies; introducing a system of primary dealers; establishing a repurchase (repo market in the government bond market. These measures will be discussed based on the evolution presented inside the paper.The paper conclude with the fact that, until now, the Romanian government bond market did not provide a benchmark for the domestic financial market and that further efforts are needed in order to increase the government bond market transparency and liquidity.

  2. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Science.gov (United States)

    2010-01-01

    ... veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND PLANT... and Adequate Veterinary Care § 2.40 Attending veterinarian and adequate veterinary care (dealers and... veterinary care to its animals in compliance with this section. (1) Each dealer and exhibitor shall employ an...

  3. 13 CFR 120.956 - Suspension or revocation of brokers and dealers.

    Science.gov (United States)

    2010-01-01

    ... brokers and dealers. 120.956 Section 120.956 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION... Suspension or revocation of brokers and dealers. The appropriate Office of Capital Access official in accordance with Delegations of Authority may suspend or revoke the privilege of any broker or dealer to...

  4. 12 CFR 221.5 - Special purpose loans to brokers and dealers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special purpose loans to brokers and dealers... FEDERAL RESERVE SYSTEM CREDIT BY BANKS AND PERSONS OTHER THAN BROKERS OR DEALERS FOR THE PURPOSE OF PURCHASING OR CARRYING MARGIN STOCK (REGULATION U) § 221.5 Special purpose loans to brokers and dealers. (a...

  5. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [fr

  6. Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Project and Supply Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Project and Supply Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Poland on 8 January 2007, the United States on 12 January 2007 and by the Director General of the IAEA on 16 January 2007. Pursuant to the Article XII of the Agreement, the Agreement entered into force on 16 January 2007, upon signature by the representatives of Poland, the United States and the Director General of the IAEA

  7. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States

  8. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [es

  9. Dependence Structures and Systemic Risk of Government Securities Markets in Central and Eastern Europe: A CoVaR-Copula Approach

    Directory of Open Access Journals (Sweden)

    Lu Yang

    2018-01-01

    Full Text Available Abstract: In this study, we proposed a new empirical method by combining generalized autoregressive score functions and a copula model with high-frequency data to model the conditional time-varying joint distribution of the government bond yields between Poland/Czech Republic/Hungary, and Germany. Capturing the conditional time-varying joint distribution of these bond yields allowed us to precisely measure the dependence of the government securities markets. In particular, we found a high dependence of these government securities markets in the long term, but a low dependence in the short term. In addition, we report that the Czech Republic showed the highest dependence with Germany, while Hungary showed the lowest. Moreover, we found that the systemic risk dynamics were consistent with the idea that the global financial crisis not only had spillover effects on countries with weak economic fundamentals (e.g., Hungary, which had the highest systemic risk, but also had contagion effects for both CEEC-3 countries and Germany. Finally, we confirm that three major market events, namely the EU accession, the global financial crisis, and the European debt crisis, caused structural changes to the dynamic correlation.

  10. Radicals and reactionaries : the polarisation of community and government in the name of public safety and security

    OpenAIRE

    Weeks, Douglas M.

    2013-01-01

    The contemporary threat of terrorism has changed the ways in which government and the public view the world. Unlike the existential threat from nation states in previous centuries, today, government and the public spend much of their effort looking for the inward threat. Brought about by high profile events such as 9/11, 7/7, and 3/11, and exacerbated by globalisation, hyper-connected social spheres, and the media, the threats from within are reinforced daily. In the UK, government has taken ...

  11. Knowledge Base for an Intelligent System in order to Identify Security Requirements for Government Agencies Software Projects

    Directory of Open Access Journals (Sweden)

    Adán Beltrán G.

    2016-01-01

    Full Text Available It has been evidenced that one of the most common causes in the failure of software security is the lack of identification and specification of requirements for information security, it is an activity with an insufficient importance in the software development or software acquisition We propose the knowledge base of CIBERREQ. CIBERREQ is an intelligent knowledge-based system used for the identification and specification of security requirements in the software development cycle or in the software acquisition. CIBERREQ receives functional software requirements written in natural language and produces non-functional security requirements through a semi-automatic process of risk management. The knowledge base built is formed by an ontology developed collaboratively by experts in information security. In this process has been identified six types of assets: electronic data, physical data, hardware, software, person and service; as well as six types of risk: competitive disadvantage, loss of credibility, economic risks, strategic risks, operational risks and legal sanctions. In addition there are defined 95 vulnerabilities, 24 threats, 230 controls, and 515 associations between concepts. Additionally, automatic expansion was used with Wikipedia for the asset types Software and Hardware, obtaining 7125 and 5894 software and hardware subtypes respectively, achieving thereby an improvement of 10% in the identification of the information assets candidates, one of the most important phases of the proposed system.

  12. 7 CFR 4290.1630 - Regulation of Brokers and Dealers and disclosure to purchasers of Leverage or Trust Certificates.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Regulation of Brokers and Dealers and disclosure to... Brokers and Dealers and disclosure to purchasers of Leverage or Trust Certificates. (a) Brokers and Dealers. Each broker, dealer, and Pool or Trust assembler approved by the Secretary pursuant to these...

  13. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    Science.gov (United States)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  14. How Swiss fuel dealers are fighting natural gas

    International Nuclear Information System (INIS)

    May, U.

    1995-01-01

    The upward trend of natural gas in Switzerland and its favourable future prospects have put Swiss fuel dealers into a state of alarm. The trade has set itself the aim to prevent a further expansion of natural gas with all the means at its disposal. The author describes and comments on the arguments put forward and measures taken to this end. (orig.) [de

  15. 125 Timber Dealers' Perception of their Knowledge of the Forest ...

    African Journals Online (AJOL)

    Nekky Umera

    Abstract. This study investigated timber dealers' knowledge of the forest law and regulations in Uyo Senatorial District. Five timber markets were selected through two-stage sampling. Data were collected from 238 traders in the selected markets using structured questionnaires and subjected to descriptive and inferential ...

  16. 12 CFR 703.8 - Broker-dealers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Broker-dealers. 703.8 Section 703.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS INVESTMENT AND DEPOSIT... commitments, as evidenced by capital strength, liquidity, and operating results. The Federal credit union...

  17. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    Næss, Tom

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  18. 我国证券公司治理绩效的因子分析%Factor Analysis of the Governance Performance of Securities Companies in China

    Institute of Scientific and Technical Information of China (English)

    陈毅

    2014-01-01

    证券公司是资本市场最重要的行为主体之一,我国证券公司虽已建立了董事会、监事会、独立董事等现代公司治理框架,但在实际运作中其职能行使上存在许多不规范的地方。2008年金融危机告诫我们,不仅需要提高证券公司的风险防范机制,更需要建立完善的公司治理结构,促使证券公司风险防范机制作用顺利发挥。通过因子分析法将证券公司内部治理变量综合成为四个因子,即规模激励因子、结构因子、监管因子和独立性因子,进而分析内部治理因子对证券公司经营绩效的影响。%The Securities firms is one of the most important actor in the capital market. Though securities firms in China have established a modern Corporate governance framework with the board of directors,the board of supervisors,independent directors,but there are many irregularities in the exercise of their functions.The financial crisis in 2008 warned us that securi-ties firms should not only improve the risk prevention mechanisms,but also need to establish sound corporate governance structure to ensure the risk prevention mechanism plays its supposed role.With a factor analysis of internal corporate governance,variables are categorized into four factors,namely the motivation and scale factor,the structure factor,the regulatory factor and the independent factors,and the effect of the internal governance factors on the performance of securities companies are analyzed.

  19. DO SLOVENIAN DEALERS USE TECHNIQUES FOR INCREASING THEIR TIPS?

    Directory of Open Access Journals (Sweden)

    Andrej Raspor

    2016-05-01

    Full Text Available In 1996 Michael Lynn introduced the idea that restaurant managers could increase tips for their waiters and thus increase turnover by training the waiters to engage tip-enhancing behaviours. Since then, the list of tip-enhancing behaviours has expanded. Therefore the potential to increase tips is more accessible. The purpose of this paper was to examine how Slovenian dealers use strategies to increase their tips. We tested fourteen techniques to increase tips. The study was carried out among 473 gaming employees, 279 of which are dealers, in the Slovenian gaming industry, in order to find out how they use these techniques and which of them can bring about an increase in their tips. The study showed that Slovenian dealers mostly do not use these techniques, and that the dealers who do use them tend to receive tips more often. The findings imply that managers and employees should be informed of these techniques in order to increase tips and their overall income. Practical implications are that we suggest that management considers these ideas for increasing flexibility and reducing the cost of work: (1 informing dealers on ways of increasing tips, (2 including the acquisition of this specific knowledge in their career plans, (3 carrying out a reform of the reward system which would include tips. Social implications will be shown in a higher gaming revenue. It is very likely – as shown in our research – that employees will receive higher wages as these will be topped up by tips. The state, in turn, will collect more taxes.

  20. Technical and governance considerations for advanced metering infrastructure/smart meters: Technology, security, uncertainty, costs, benefits, and risks

    International Nuclear Information System (INIS)

    McHenry, Mark P.

    2013-01-01

    The fundamental role of policymakers when considering Advanced Metering Infrastructure (AMI), or ‘smart meters for energy and water infrastructure is to investigate a broad range of complex interrelated issues. These include alternative technical and non-technical options and deployment needs, the cost and benefits of the infrastructure (risks and mitigation measures), and the impact of a number of stakeholders: consumers, distributors, retailers, competitive market operators, competing technology companies, etc. The scale and number of potential variables in the AMI space is an almost unprecedented challenge to policymakers, with the anticipation of new ancillary products and services, associated market contestability, related regulatory and policy amendments, and the adequacy of consumer protection, education, and safety considerations requiring utmost due-diligence. Embarking on AMI investment entails significant technical, implementation, and strategic risk for governments and administering bodies, and an active effort is required to ensure AMI governance and planning maximises the potential benefits, and minimise uncertainties, costs, and risks to stakeholders. This work seeks to clarify AMI fundamentals and discusses the technical and related governance considerations from a dispassionate perspective, yet acknowledges many stakeholders tend to dichotomise debate, and obfuscate both advantages and benefits, and the converse. - Highlights: • AMI presents an almost unprecedented technical and governance policy challenge. • AMI enables vertical integration of electricity, gas, water, IT, and telco entities • AMI investments involve major technical, implementation, and strategic decisions. • Adequacy of consumer education, safety, privacy, and protection is paramount. • Policy must maximise AMI benefits and minimise uncertainties, costs, and risks

  1. Closing the Cyber Gap: Integrating Cross-Government Cyber Capabilities to Support the DHS Cyber Security Mission

    Science.gov (United States)

    2014-12-01

    identifies and eliminates the actors who seek to target our cyber 152 “2013 Data Breach Investigations Report,” Verizon Enterprise Solutions, accessed...future. 360 “2013 Data Breach Investigations Report,” Verizon Enterprise Solutions, accessed September 29, 2013, http://www.verizonenterprise.com/DBIR...critical system owners and worldwide cyber security teams.382 381 Data Breach on the Rise: Protecting Personal Information from Harm: Hearing

  2. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    Science.gov (United States)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  3. Loyalty marketing in automobile dealerships : case: car dealer X

    OpenAIRE

    Hyyryläinen, Heidi

    2012-01-01

    The purpose of this thesis is to study how customer loyalty is taken into account in automobile dealerships, what loyalty marketing means are used to improve customer loyalty, and what potential new loyalty marketing means can be implemented. The thesis is commissioned by Car dealer X. In the theoretical part, areas covered are customership and loyalty marketing. Customership includes customer satisfaction, customer loyalty, customer value and customer retention. Loyalty marketing contain...

  4. Dealer Group or Financial Planning Group? A Brief Technical Note

    Directory of Open Access Journals (Sweden)

    Lujer Santacruz

    2011-06-01

    Full Text Available This technical note examines whether the industry practice of using the term dealer group when referring to afinancial planning group contributes to the general perception that financial advisers are not objective whenmaking financial product recommendations. An experimental design carried out through an online survey isused. This is supplemented by a direct comparison survey on the two terminologies. The results provide acase for the industry to adopt a new terminology.

  5. 17 CFR 402.1 - Application of part to registered brokers and dealers and financial institutions; special rules...

    Science.gov (United States)

    2010-04-01

    ... interdealer broker means an entity engaged exclusively in business as a broker that effects, on an initially... business day and offset by government securities failed to deliver of the same issue and quantity. In no... same government securities failed-to-deliver contract for more than one business day. A government...

  6. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and Transformation of Infectious Disease Control System in South Korea.

    Science.gov (United States)

    Choi, Eun Kyung; Lee, Jong-Koo

    2016-12-01

    This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH) was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC) was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in disease control. The

  7. Changes of Global Infectious Disease Governance in 2000s: Rise of Global Health Security and Transformation of Infectious Disease Control System in South Korea

    Directory of Open Access Journals (Sweden)

    Eun Kyung CHOI

    2016-12-01

    Full Text Available This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in

  8. Bonus and Rebate: Perception of Exclusive GSM Dealers and Their Salesmen in Turkey

    Directory of Open Access Journals (Sweden)

    Melik Karabiyikoglu

    2012-07-01

    Full Text Available The aim of this paper is to study bonus and rebate for exclusive dealers in GSM sector in Turkey, for which operators and handset manufacturers provide special incentives to dealers for exceeding specific sales targets. They develop a theoretical model of dealers and manufacturer behavior based on observations about key aspects of the mobile phone market. The analysis provides important insights about sales bonus. For example, rebate is not preferred by the owners of dealers instead of bonuses. The authors find empirical support when they test the theoretical results.

  9. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  10. Measuring the impact of negative demand shocks on car dealer networks

    NARCIS (Netherlands)

    Albuquerque, P.; Bronnenberg, B.J.

    2012-01-01

    The goal of this paper is to study the behavior of consumers, dealers, and manufacturers in the car sector and present an approach that can be used by managers and policy makers to investigate the impact of significant demand shocks on profits, prices, and dealer networks. More specifically, we

  11. 9 CFR 2.132 - Procurement of dogs, cats, and other animals; dealers.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Procurement of dogs, cats, and other... SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Miscellaneous § 2.132 Procurement of dogs, cats, and other animals; dealers. (a) A class “B” dealer may obtain live random source dogs and cats...

  12. 76 FR 23732 - Margin Requirements for Uncleared Swaps for Swap Dealers and Major Swap Participants

    Science.gov (United States)

    2011-04-28

    ... the currency in which payment obligations under the swap are required to be settled; Any obligation... RIN 3038--AC97 Margin Requirements for Uncleared Swaps for Swap Dealers and Major Swap Participants... the Commission to adopt capital and initial and variation margin requirements for certain swap dealers...

  13. 27 CFR 31.103 - Formation of a partnership by two dealers.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Formation of a partnership... AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS ALCOHOL BEVERAGE DEALERS Partnerships § 31.103 Formation of a partnership by two dealers. Where two persons form a partnership after each has registered...

  14. 41 CFR 50-201.103 - Dealer as agent of undisclosed principal.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Dealer as agent of undisclosed principal. 50-201.103 Section 50-201.103 Public Contracts and Property Management Other Provisions... materials, supplies, articles, or equipment required under the contract, such dealer will be deemed the...

  15. 12 CFR 220.101 - Transactions of customers who are brokers or dealers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Transactions of customers who are brokers or... OF THE FEDERAL RESERVE SYSTEM CREDIT BY BROKERS AND DEALERS (REGULATION T) Interpretations § 220.101 Transactions of customers who are brokers or dealers. The Board has recently considered certain questions...

  16. Understanding brand and dealer retention in the new car market : The moderating role of brand tier

    NARCIS (Netherlands)

    Verhoef, Peter C.; Langerak, Fred; Donkers, Bas

    2007-01-01

    Dealers may contribute to brand retention through their sales and service efforts. In this study we investigate the degree to which dealers contribute to brand retention and how this contribution is moderated by brand tier. To this end we distinguish between economy, volume and prestige brands. We

  17. Manitoba Motor Dealers Association pilot project : final report

    International Nuclear Information System (INIS)

    2006-08-01

    This report described a 3-month pilot project conducted by EnerGuide for Vehicles in collaboration with the Manitoba Motor Dealers Association (MMDA) to increase dealership and consumer awareness of vehicle impacts on climate change. The project also aimed to engage MMDA's members in helping to promote and distribute information on fuel efficient vehicles and fuel efficient driving habits. Program tools in both the dealership showroom as well as service areas were used. Objectives of the project also included gaining public opinion research (POR) information regarding the impact of program tools; gaining feedback from new car dealers regarding the success of the project; gauging customer perceptions of the importance of fuel efficiency when selecting a new vehicle; determining whether or not drivers verify tire pressure on their vehicles; determining whether or not drivers incorporate energy efficient driving habits; and gauging customer perceptions regarding the importance of incorporating behaviours to improve fuel efficiency. The study used a mixed methodology of online and telephone surveys. A total of 41 dealerships participated in the project. The final sample of surveys consisted of 1926 customer records. The total overall number of completed interviews was 463. Results indicated that most dealers believed the campaign was a success, and that staff and customers learned about energy efficiency as a result of the campaign. Seventy-five per cent of dealers agreed that they would participate in future energy efficiency programs. Campaign materials and customer incentives were widely viewed as successful in raising awareness. Seven in 10 dealership customers recalled at least 1 of the promotional endeavours, and a large majority of customers indicated the information they saw at the dealership encouraged them to consider fuel efficiency when buying or maintaining a vehicle in the future. The majority of new customers considered fuel consumption to be the second

  18. 13 CFR 107.1640 - SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. 107.1640 Section 107.1640 Business Credit and Assistance... records of the CRA, Brokers, Dealers and Pool or Trust assemblers. The CRA and any broker, dealer and Pool...

  19. 7 CFR 4290.1640 - Secretary's access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Secretary's access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. 4290.1640 Section 4290.1640 Agriculture Regulations of the... to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. The CRA and any broker, dealer...

  20. 17 CFR 240.15c3-3 - Customer protection-reserves and custody of securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer protection-reserves... Markets § 240.15c3-3 Customer protection—reserves and custody of securities. (a) Definitions. For the... the dealer as to that collateral; (iii) The Securities Investor Protection Act of 1970 (15 U.S.C...

  1. Analysis of the nexus between population, water resources and Global Food Security highlights significance of governance and research investments and policy priorities.

    Science.gov (United States)

    Yunusa, Isa A M; Zerihun, Ayalsew; Gibberd, Mark R

    2018-05-10

    Analyses of sensitivity of Global Food Security (GFS) score to a key set of supply or demand factors often suggest population and water supply as being the most critical and on which policies tend to focus. To explore other policy options, we characterised the nexus between GFS and a set of supply or demand factors including defining including population, agricultural and industrial water-use, agricultural publications (as a surrogate for investment in agricultural research and development [R&D]), and corruption perception index (CPI), to reveal opportunities for attaining enduring GFS. We found that despite being the primary driver of demand for food, population showed no significant correlation with GFS scores. Similarly agricultural water-use was poorly correlated with GFS scores, except in countries where evaporation exceeds precipitation and irrigation is significant. However, GFS had a strong positive association with industrial water-use as a surrogate for overall industrialisation. Recent expansions in cultivated land area failed to yield concomitant improvements in GFS score since such expansions have been mostly into marginal lands with low productivity and also barely compensated for lands retired from cropping in several developed economies. However, GFS was positively associated with agricultural R&D investments, as it was with the CPI scores. The apparent and relative strengths of these drivers on GFS outcome amongst countries were in the order: industrial water-use ≈ publication rate ≈ corruption perception > agricultural water-use > population. We concluded by suggesting that to enshrine enduring food security, policies should prioritise (1) increased R&D investments that address farmer needs, and (2) governance mechanisms that promote accountability in both research and production value chains. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  2. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  3. Internet Governance and National Security

    Science.gov (United States)

    2012-01-01

    by the International Orga­ nization of Standards for the Open Systems Interconnection ( OSI ) model as the basis of Internet networking. A brief...or “ride on top” of the Internet. A corporate LAN , such as “.company–name” for internal company use, is an example of the first. When a group wishes

  4. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  5. 9 CFR 201.61 - Market agencies selling or purchasing livestock on commission; relationships with dealers.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION, PACKERS AND STOCKYARDS ADMINISTRATION (PACKERS AND STOCKYARDS PROGRAMS), DEPARTMENT OF... association with dealers or other buyers which has a tendency to lessen the loyalty of the market agency to...

  6. 75 FR 16666 - Liquor Dealer Recordkeeping and Registration, and Repeal of Certain Special (Occupational) Taxes

    Science.gov (United States)

    2010-04-02

    .... Skud, Deputy Assistant Secretary (Tax, Trade, and Tariff Policy). [FR Doc. 2010-7269 Filed 4-1-10; 8:45... D also borrowed regulations from 27 CFR part 31 (Alcohol Beverage Dealers) to reflect SOT policy...

  7. Food and Nutrition (UnGovernance

    Directory of Open Access Journals (Sweden)

    Francisco Sarmento

    2016-05-01

    Full Text Available This article discusses, from a political economy perspective, the complexity of food and nutrition security governance, including different views underlying the expected role that such governance should play in agriculture food security and nutrition.

  8. Afghanistan: Government Formation and Performance

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2009-01-01

    .... However, ethnic disputes remain confined largely to political debate and competition, enabling President Karzai to focus on improving governance, reversing security deterioration, and his re-election...

  9. 'Good Governance' dan 'Governability'

    Directory of Open Access Journals (Sweden)

    - Pratikno

    2005-03-01

    Full Text Available The article endeavors to trace the outset of governance concept, its dominant meanings and discourse, and its implication towards governability. The central role of government in the governing processes has predominantly been adopted. The concept of governance was emerged precisely in the context of the failure of government as key player in regulation, economic redistribution and political participation. Governance is therefore aimed to emphasize pattern of governing which are based both on democratic mechanism and sound development management. However, practices of such good governance concept –which are mainly adopted and promoted by donor states and agencies– tend to degrade state and/or government authority and legitimacy. Traditional function of the state as sole facilitator of equal societal, political and legal membership among citizens has been diminished. The logic of fair competition has been substituted almost completely by the logic of free competition in nearly all sectors of public life. The concept and practices of good governance have resulted in decayed state authority and failed state which in turn created a condition for "ungovernability". By promoting democratic and humane governance, the article accordingly encourages discourse to reinstall and bring the idea of accountable state back in.

  10. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  11. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  12. 75 FR 71397 - Regulations Establishing and Governing the Duties of Swap Dealers and Major Swap Participants

    Science.gov (United States)

    2010-11-23

    ...; \\7\\ (2) credit risk; \\8\\ (3) liquidity risk; \\9\\ (4) foreign currency risk; \\10\\ (5) legal risk; \\11... market prices, and the sensitivity of option positions to other market factors. \\8\\ Credit risk includes... management program that takes into account market risk, credit risk, liquidity risk, foreign currency risk...

  13. Conclusion: the role of the EU in the legal dimension of global governance

    NARCIS (Netherlands)

    Van Vooren, B.; Blockmans, S.; Wouters, J.; Van Vooren, B.; Blockmans, S.; Wouters, J.

    2013-01-01

    This chapter revisits the main themes of the preceding discussions on the EU's role in global governance. These include rule law based collective governance, security governance, trade governance, environmental governance, financial governance, and social governance. Across different areas of

  14. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  15. Benefit from the Government

    NARCIS (Netherlands)

    Evert Pommer; Jedid-Jah Jonker

    2003-01-01

    Original title: Profijt van de overheid. Income levels are determined to a considerable extent by the government, which exerts an influence through social security and taxation. The traditional purchasing power tables are a reflection of this. However, the influence of the government goes

  16. Using IT Governance

    Science.gov (United States)

    Brobst, Jan; Council, Chip

    2005-01-01

    The discussion in this article is intended to provide an examination of why top management, IT management, and internal auditors should be interested in IT governance. Some aspects of IT management will be described including implementation, auditing, availability, security, and alignment. One governance framework, COBIT, will be utilized as a…

  17. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. County and Parish Boundaries - COUNTY_GOVERNMENT_BOUNDARIES_IDHS_IN: Governmental Boundaries Maintained by County Agencies in Indiana (Indiana Department of Homeland Security, Polygon feature class)

    Data.gov (United States)

    NSGIC State | GIS Inventory — COUNTY_GOVERNMENT_BOUNDARIES_IDHS_IN is a polygon feature class that contains governmental boundaries maintained by county agencies in Indiana, provided by personnel...

  20. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  1. 17 CFR 240.15b1-3 - Registration of successor to registered broker or dealer.

    Science.gov (United States)

    2010-04-01

    ... continues the business of a registered predecessor broker or dealer, and the succession is based solely on a... and continues the business of a broker or dealer registered pursuant to section 15(b) of the Act, the... successor, within 30 days after such succession, files an application for registration on Form BD, and the...

  2. 13 CFR 108.1640 - SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. 108.1640 Section 108.1640 Business Credit and Assistance....1640 SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. The CRA and any...

  3. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  4. 26 CFR 1.475(c)-1 - Definitions-dealer in securities.

    Science.gov (United States)

    2010-04-01

    .... B regularly offers to enter into interest rate swaps with other persons in the ordinary course of its trade or business. B is willing to enter into interest rate swaps under which it either pays a... and able to enter into either side of positions in a foreign currency with other banks in the...

  5. 17 CFR 240.15Bc3-1 - Withdrawal from registration of municipal securities dealers.

    Science.gov (United States)

    2010-04-01

    ... update any inaccurate information. (b) Every notice of withdrawal from registration as a municipal... Depository (operated by the Financial Industry Regulatory Authority, Inc.) in accordance with applicable... public interest or for the protection of investors, or within such shorter period of time as the...

  6. 76 FR 604 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2011-01-05

    ... November 9, 2010 (``BDA Letter I''); letter from Hartfield Titus & Donnelly, LLC, dated November 9, 2010..., 2010 (``SIFMA Letter II''), letter from Bond Dealers of America, dated December 14, 2010 (``BDA Letter...\\ See BDA Letter I, Coastal Securities Letter, GFOA Letter, HTD Letter, Morgan Stanley Letter, RW Smith...

  7. 77 FR 18283 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and...

    Science.gov (United States)

    2012-03-27

    ...-dealer must establish that the uncertificated securities are lodged in what are generally referred to as...) \\19\\ will be making continual and ongoing representations and assurances to the controlling AIP... Manufacturer or its designee in the name of the controlling AIP Distributor on behalf of its customer; 5. In...

  8. Application of homomorphism to secure image sharing

    Science.gov (United States)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  9. Penerapan Metode K-nearest Neighbor pada Penentuan Grade Dealer Sepeda Motor

    OpenAIRE

    Leidiyana, Henny

    2017-01-01

    The mutually beneficial cooperation is a very important thing for a leasing and dealer. Incentives for marketing is given in order to get consumers as much as possible. But sometimes the surveyor objectivity is lost due to the conspiracy on the field of marketing and surveyors. To overcome this, leasing a variety of ways one of them is doing ranking against the dealer. In this study the application of the k-Nearest Neighbor method and Euclidean distance measurement to determine the grade deal...

  10. 78 FR 51823 - Financial Responsibility Rules for Broker-Dealers

    Science.gov (United States)

    2013-08-21

    ... 3, 2007 from Keith F. Higgins, Chair, Committee on Federal Regulation of Securities, American Bar.... Cernocky (``Cernocky Letter''); letter dated May 11, 2012 from Chris Barnard (``Barnard Letter''); letter...

  11. A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2003-01-01

    ...), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources...

  12. The governance of complementary global regimes and the pursuit of human security : the interaction between the United Nations and the International Criminal Court

    NARCIS (Netherlands)

    Marrone, Andrea

    2015-01-01

    This study offers an overview of the challenges occurring in the emerging regime of international criminal justice as a tool of sustainable peace. It illustrates the impact of such regime in international law and international relations focusing on the obstacles and concerns of its governance in the

  13. 77 FR 35892 - Dual and Multiple Associations of Persons Associated With Swap Dealers, Major Swap Participants...

    Science.gov (United States)

    2012-06-15

    ... methods: Agency Web Site, via its Comments Online process: http://comments.cftc.gov . Follow the..., retail foreign exchange dealer, introducing broker, commodity trading advisor, commodity pool operator or... with nobody minding the store''). In connection with the 1992 Amendments, the Commission also amended...

  14. 9 CFR 201.30 - Amount of market agency, dealer and packer bonds.

    Science.gov (United States)

    2010-01-01

    ... coverage, divide the dollar value of livestock sold during the preceding business year, or the substantial part of that business year, in which the market agency did business, by the actual number of days on... required to comply with any State law. (b) Market agency buying on commission or dealer. The amount of bond...

  15. The Poetry of Antiques: Trade and/in Knowledge among British Antiques Dealers

    Directory of Open Access Journals (Sweden)

    Makovicky Nicolette

    2017-12-01

    Full Text Available This article considers the role of information, communication, and knowledge in processes of exchange and value creation in the British antiques market. As such, it positions itself between the long-standing anthropological interest in the cultural construction of value (see APPADURAI 1986; GRAEBER 2001, and the equally long-standing interest in how asymmetries of information affect consumer behaviour (see AKERLOF 1970. Drawing on ethnographic material gathered over three months of fieldwork amongst antique dealers in the Notting Hill and Kensington Area of London, I aim to through light on what it is that dealers ‘know’ and how this knowledge is translated into profit within the trade. I argue that dealers’ knowledge of objects is encyclopaedic, discursive, and tactile at once and it is gained mainly through many years of handling of objects. Dealers must also keep abreast with the market movement of objects and their prices using this information to gage the potential profit they may accrue from a deal. Both forms of knowledge, I argue, are mobilized at once when a dealer is investing in stock and when he or she seeks to sell an item, in a ritual of show-and-tell that serves to both to verify the quality, condition and authenticity of a piece and to simultaneously negotiate its price.

  16. 31 CFR 103.122 - Customer identification programs for broker-dealers.

    Science.gov (United States)

    2010-07-01

    ... Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS Anti-Money Laundering Programs Anti-Money Laundering Programs § 103.122 Customer identification programs for broker-dealers. (a... anti-money laundering compliance program required under 31 U.S.C. 5318(h). (2) Identity verification...

  17. Characterization of foreign exchange market using the threshold-dealer-model

    Science.gov (United States)

    Yamada, Kenta; Takayasu, Hideki; Takayasu, Misako

    2007-08-01

    We introduce a deterministic dealer model which implements most of the empirical laws, such as fat tails in the price change distributions, autocorrelation of price change and non-Poissonian intervals. We also clarify the causality between microscopic dealers’ dynamics and macroscopic market's empirical laws.

  18. 75 FR 44996 - Study Regarding Obligations of Brokers, Dealers, and Investment Advisers

    Science.gov (United States)

    2010-07-30

    ... the varying scope and terms of retail customer relationships of brokers, dealers, investment advisers..., or overlaps in legal or regulatory standards in the protection of retail customers relating to the... INFORMATION CONTACT: Holly Hunter-Ceci, Division of Investment Management, at (202) 551-6825 or Emily Russell...

  19. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-11-15

    ... relationship with the ultimate customer, can more effectively implement them. In addition, a broker or dealer... specific risk management controls and supervisory procedures to a customer that is a registered broker... such customer, based on its position in the transaction and relationship with the ultimate customer...

  20. 78 FR 11156 - Proposed Information Collection; Comment Request; Southeast Region Dealer and Interview Family of...

    Science.gov (United States)

    2013-02-15

    ... Collection; Comment Request; Southeast Region Dealer and Interview Family of Forms AGENCY: National Oceanic... includes interview with fishermen to gather information on the fishing effort, location and type of gear.... Information from fisherman is obtained by face-to-face interviews. III. Data OMB Control Number: 0648-0013...

  1. Drug dealers' rational choices on which customers to rip-off.

    Science.gov (United States)

    Jacques, Scott; Allen, Andrea; Wright, Richard

    2014-03-01

    Drug dealers are infamous for overcharging customers and handing over less than owed. One reason rip-offs frequently occur is blackmarket participants have limited access to formal means of dispute resolution and, as such, are attractive prey. Yet drug dealers do not cheat every customer. Though this is implicitly understood in the literature, sparse theoretical attention has been given to which customers are ripped-off and why. To address that lacuna, this paper uses the rationality perspective to analyze qualitative data obtained in interviews with 25 unincarcerated drug sellers operating in disadvantaged neighborhoods of St. Louis, Missouri. We find that dealers typically rip-off six types of customers: persons who are strangers, first-time or irregular customers; do not have sufficient money on hand to make a purchase; are uninformed about going market rates; are deemed unlikely to retaliate; are offensive; or are addicted to drugs. Dealers target these groups due to perceiving them as unlikely to be repeat business; not worth the hassle of doing business with; unlikely to realize they are being ripped-off; in the wrong and thus deserving of payback; and, unwilling to retaliate or take their money elsewhere. Our findings are discussed in relation to their practical implications, including the importance of giving blackmarket participants greater access to law, and how customers may prevent being ripped-off. Copyright © 2013 Elsevier B.V. All rights reserved.

  2. 49 CFR 599.303 - Agency disposition of dealer application for reimbursement.

    Science.gov (United States)

    2010-10-01

    ... reimbursement. 599.303 Section 599.303 Transportation Other Regulations Relating to Transportation (Continued... PROCEDURES FOR CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Qualifying Transactions and Reimbursement § 599.303 Agency disposition of dealer application for reimbursement. (a) Application review. Upon...

  3. 9 CFR 201.32 - Trustee in market agency, dealer and packer bonds.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Trustee in market agency, dealer and packer bonds. 201.32 Section 201.32 Animals and Animal Products GRAIN INSPECTION, PACKERS AND STOCKYARDS... similar trade associations, attorneys at law, banks and trust companies, or their officers, are deemed...

  4. 76 FR 65783 - Registration of Security-Based Swap Dealers and Major Security-Based Swap Participants

    Science.gov (United States)

    2011-10-24

    ... Public Reference Room, 100 F Street, NE., Washington, DC 20549, on official business days between the.... Special Situations 1. Succession: Proposed Rule 15Fb2-5 2. Insolvency: Proposed Rule 15Fb2-6 F. Technical... an ordinary course of business for its own account; or (iv) engages in any activity causing it to be...

  5. The government of life

    DEFF Research Database (Denmark)

    Villadsen, Kaspar; Wahlberg, Ayo

    2015-01-01

    . Subsequent research on biopolitics and governmentality has tended to separate the concepts, differentiating into distinct research traditions each with different intellectual pathways. We propose to bring these conceptual innovations together to understand contemporary problems of the government of life...... of death power, the interplay of sovereignty, discipline and security, governmentalization through medical normalization, and ‘securitization’ of life as circulations and open series. The article also introduces this special feature on the government of life in which significant scholars explores issues...

  6. Community Security and Justice under United Nations Governance: Lessons from Chiefs’ Courts in South Sudan’s Protection of Civilians Sites

    Directory of Open Access Journals (Sweden)

    Rachel Ibreck

    2017-12-01

    Full Text Available This article examines the public authority of chiefs’ courts within the United Nations Mission in South Sudan (UNMISS Protection of Civilians Sites (PoCs. After December 2013, UNMISS peacekeepers opened the gates of their bases to around 200,000 civilians fleeing war. This unintentionally created a legal and political anomaly. Over time, conflicts and crimes rose within the sites, and UNMISS improvised a form of administration. But while the internationals sought technical solutions, people displaced within the sites turned to familiar ‘customary’ methods to manage problems of insecurity, establishing chiefs’ courts. The PoC sites became an arena of plural authorities, with chiefs working alongside camp administrators, peacekeepers and humanitarian actors. We explore how and why the chiefs responded to insecurity within the sites and whether they engaged with, or diverged from United Nations actors and international norms. We demonstrate that justice remains central to the provision of security in contexts of war and displacement. International peace interventions are rightly wary of ‘customary’ justice processes that prioritise communities and families at the expense of individual rights, but this unique case shows that they are sources of trust and consistency that are resilient, adaptable and can contribute to human security.

  7. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  8. Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Portugal on 27 June 2006 and the United States on 13 December 2006, and by the Director General of the IAEA on 14 December 2006. Pursuant to the Article XII.1 of the Agreement, the Agreement entered into force on 19 April 2007, the date on which the Agency received written notification from Portugal that its internal requirements for entry into force had been met

  9. Gaining Access to Hidden Populations: Strategies for Gaining Cooperation of Drug Sellers/Dealers and Their Families in Ethnographic Research

    Science.gov (United States)

    Dunlap, Eloise; Johnson, Bruce D.

    2009-01-01

    Summary This article examines strategies for gaining the cooperation of drug sellers and their families in order to conduct ethnographic research. The strategies were developed during an eight year study of drug dealers in New York City. A key element in gaining the ability to talk with and observe drug dealers and their family members was the availability of funds to compensate respondents for interviews and other expenses associated with building and maintaining rapport. Access to more successful crack sellers and dealers rested upon the right contacts. The “right contact” is a critical element. Locating a trusted “go-between” was adapted from strategies employed by cocaine sellers to arrange transactions involving large quantities of drugs. Such transactions rely upon a trusted associate of a dealer, the “go-between,” who performs various roles and assumes risks the dealer wishes to avoid. The role of the go-between became important when ethnographers attempted to reach drug dealers for research purposes. Favors and trust are central components in the equation of access to the dealer and his family. Favors are a part of drug dealers' interaction patterns: everyone owes someone else a favor. Such reciprocity norms exist independently of the amount of drugs involved and outlast any particular transaction. Reputations and favors are related. This framework of favors, trust, and reciprocity provides a basis for the ethnographer to gain an introduction to dealers and sellers. The “go-between” is critical because he/she explains the ethnographer's role to the dealer and helps arrange an initial meeting between the ethnographer and the seller. Once the go-between has provided an initial introduction, the ethnographer marshals the communication skills necessary to convince the dealer to allow further contact and conversations. This article examines the ritual of initial conversation within its cultural framework. Developing rapport requires showing

  10. 12 CFR 220.127 - Independent broker/dealers arranging credit in connection with the sale of insurance premium...

    Science.gov (United States)

    2010-01-01

    ... an independent broker/dealer to sell such a program and to arrange for financing in that connection. In reaching such decision, the Board again relied upon the earlier understanding that independent...

  11. What governs governance, and how does it evolve? The sociology of governance-in-action.

    Science.gov (United States)

    Fox, Nick J; Ward, Katie J

    2008-09-01

    Governance addresses a wide range of issues including social, economic and political continuity, security and integrity, individual and collective safety and the liberty and rights to self-actualization of citizens. Questions to be answered include how governance can be achieved and sustained within a social context imbued with cultural values and in which power is distributed unevenly and dynamically, and how governance impacts on individuals and institutions. Drawing on Gramscian notions of hegemony and consent, and recent political science literatures on regulation and meta-regulation, this paper develops a sociological model of governance that emphasizes a dynamic and responsive governance in action. Empirical data from a study of pharmaceutical governance is used to show how multiple institutions and actors are involved in sustaining effective governance. The model addresses issues of how governance is sustained in the face of change, why governance of practices varies from setting to setting, and how governance is achieved without legislation.

  12. Pengaruh Pelaksanaan Pelatihan terhadap Kinerja Karyawan PT. Sejahtera Buana Trada Cabang Pekanbaru (Kasus Karyawan Bagian Marketing Dealer Suzuki Mobil)

    OpenAIRE

    Juwita, Ratna; ", Suryalena

    2016-01-01

    The purpose of this study was to determine the effect of exercise training on the performance of employees of PT. Sejahtera Buana Trada Branch Pekanbaru (Case Employee Suzuki Car Dealer Marketing Division). This research was conducted at PT. Sejahtera Buana Trada Branch Pekanbaru (Suzuki Car Dealer) located in the SM. Amin Number.89 Simpang Baru Tampan. In this research method used is a method of statistical tests with SPSS, where samples were used that employee marketing division of PT. Seja...

  13. 12 CFR 368.3 - Business conduct.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Business conduct. 368.3 Section 368.3 Banks and... SECURITIES SALES PRACTICES § 368.3 Business conduct. A bank that is a government securities broker or dealer... conduct of its business as a government securities broker or dealer. ...

  14. Interactive governance

    DEFF Research Database (Denmark)

    Sørensen, Eva; Torfing, Jacob; Peters, B. Guy

    Governance has become one of the most commonly used concepts in contemporary political science. It is, however, often used to mean a variety of different things. This book helps to clarify this conceptual muddle by concentrating on one variety of governance-interactive governance. The authors argue...... that although the state may remain important for many aspects of governing, interactions between state and society represent an important, and perhaps increasingly important, dimension of governance. These interactions may be with social actors such as networks, with market actors or with other governments......, but all these forms represent means of governing involving mixtures of state action with the actions of other entities.This book explores thoroughly this meaning of governance, and links it to broader questions of governance. In the process of explicating this dimension of governance the authors also...

  15. Digital government and public health.

    Science.gov (United States)

    Fountain, Jane E

    2004-10-01

    Digital government is typically defined as the production and delivery of information and services inside government and between government and the public using a range of information and communication technologies. Two types of government relationships with other entities are government-to-citizen and government-to-government relationships. Both offer opportunities and challenges. Assessment of a public health agency's readiness for digital government includes examination of technical, managerial, and political capabilities. Public health agencies are especially challenged by a lack of funding for technical infrastructure and expertise, by privacy and security issues, and by lack of Internet access for low-income and marginalized populations. Public health agencies understand the difficulties of working across agencies and levels of government, but the development of new, integrated e-programs will require more than technical change - it will require a profound change in paradigm.

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. How to govern the cloud?

    NARCIS (Netherlands)

    Prüfer, J.; Diamond, S.; Wainwright, N.

    2013-01-01

    This paper applies economic governance theory to the cloud computing industry. We analyze which governance institution may be best suited to solve the problems stemming from asymmetric information about the true level of data protection, security, and accountability offered by cloud service

  19. Global health justice and governance.

    Science.gov (United States)

    Ruger, Jennifer Prah

    2012-01-01

    While there is a growing body of work on moral issues and global governance in the fields of global justice and international relations, little work has connected principles of global health justice with those of global health governance for a theory of global health. Such a theory would enable analysis and evaluation of the current global health system and would ethically and empirically ground proposals for reforming it to more closely align with moral values. Global health governance has been framed as an issue of national security, human security, human rights, and global public goods. The global health governance literature is essentially untethered to a theorized framework to illuminate or evaluate governance. This article ties global health justice and ethics to principles for governing the global health realm, developing a theoretical framework for global and domestic institutions and actors.

  20. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  1. Interactive Governance

    DEFF Research Database (Denmark)

    Bang, Henrik

    2016-01-01

    Governance analysis has exploded in recent years, and it has become nearly impossible to tell what difference the concept and practice of governance makes from those of government and state. In addition governance analysis has been placed more and more in the shadow of the new institutionalisms and...... and growth. However, interactive governance is not a property or effect of institutions; nor does it apply solely to those individuals who seek success above everything else. It is connective more than individualistic or collectivistic in nature; and it manifests a governability capacity which...

  2. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  3. Electronic Government

    DEFF Research Database (Denmark)

    Wimmer, Maria A.; Traunmüller, Roland; Grönlund, Åke

    This book constitutes the refereed proceedings of the 4th International Conference on Electronic Government, EGOV 2005, held in Copenhagen, Denmark, in August 2005. The 30 revised papers presented were carefully reviewed and selected from numerous submissions, and assess the state-of-the-art in e-government/e-governance...

  4. Stakeholder Governance

    DEFF Research Database (Denmark)

    Flak, Leif Skiftenes; Rose, Jeremy

    2005-01-01

    to e-Government. Originally a management theory, stakeholder theory advocates addressing the concerns of all stakeholders in a firm, as opposed to concentration on the interests of senior managers and stockholders. Apart from the original profit focus, there is no serious conceptual mismatch between...... of governance. Finally, the paper makes recommendations for future work in adapting ST to the e-government context....

  5. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  6. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  7. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  8. Private Security Contractors in Darfur

    DEFF Research Database (Denmark)

    Leander, Anna

    2006-01-01

    This article argues that the role of Private Security Contractors in Darfur reflects and reinforces neo-liberal governmentality in contemporary security governance. It is an argument (in line with other articles in this special issue) which is more interested in discussing how the privatization....... It underlines that governance is increasingly taking place through a set of (quasi-) markets, it is marked by entrepreneurial values, and a hands off approach to governance. We then discuss the way this overall change is reflected in and reinforced by the role of private security contractors in Darfur. Drawing...... at these processes is necessary to understand the role of private security contractors in Darfur. But more than this, practices in Darfur entrench neo-liberal governmentality in security more generally. The managerial and `de-politicizing' approach to security in Darfur displaces alternative views not only...

  9. Program governance

    CERN Document Server

    Khan, Muhammad Ehsan

    2014-01-01

    FOUNDATION OF GOVERNANCEGovernanceDefining GovernanceGovernance at Multiple LevelsSummaryReferencesTransaction Cost EconomicsTransactions-Core Elements and Attributes     Behavioral Assumptions     Governance Structure AttributesHazards of Concern     Incomplete Contracting     Bilateral Dependency and Fundamental Transformation     Adaptation or MaladaptationLinking Governance, Governance Structures, and ContractsThe Impact of Asset Specificity and Behavioral Assumptions on ContractsAp

  10. Plural Governance

    DEFF Research Database (Denmark)

    Mols, Niels Peter; Menard, Claude

    2014-01-01

    Plural governance is a form of governance where a firm both makes and buys similar goods or services. Despite a widespread use of plural governance there are no transaction cost models of how plural governance affects performance. This paper reviews the literature about plural forms and proposes...... a model relating transaction cost and resource-based variables to the cost of the plural form. The model is then used to analyze when the plural form is efficient compared to alternative governance structures. We also use the model to discuss the strength of three plural form synergies....

  11. 17 CFR 249.619 - Form TA-Y2K, information required of transfer agents pursuant to section 17 of the Securities...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form TA-Y2K, information... Certain Exchange Members, Brokers, and Dealers § 249.619 Form TA-Y2K, information required of transfer... affecting Form TA-Y2K, see the List of CFR Sections Affected, which appears in the Finding Aids section of...

  12. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  13. 7 CFR 4274.326 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 4274.326 Section 4274.326 Agriculture... (IRP) § 4274.326 Security. (a) Intermediaries. Security for all loans to intermediaries must be such... and the Government. (1) Security for such loans may include, but is not limited to: (i) Any realty...

  14. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  15. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  16. General Principles Governing Liability

    International Nuclear Information System (INIS)

    Reyners, P.

    1998-01-01

    This paper contains a brief review of the basic principles which govern the special regime of liability and compensation for nuclear damage originating on nuclear installations, in particular the strict and exclusive liability of the nuclear operator, the provision of a financial security to cover this liability and the limits applicable both in amount and in time. The paper also reviews the most important international agreements currently in force which constitute the foundation of this special regime. (author)

  17. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  18. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    Operation Iraqi Freedom succeeded in overthrowing Saddam Hussein, but Iraq remains violent and unstable because of Sunni Arab resentment and a related insurgency, as well as growing sectarian violence...

  19. Research Award: Governance, Security, and Justice

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    and marginalized groups have difficulty claiming their right to live in a safe and prosperous environment. ... Applicants should clearly outline their qualifications for this position, and explain how this opportunity will advance their career goals.

  20. Security Forces of the Kurdistan Regional Government

    Science.gov (United States)

    2009-02-26

    crisp uniforms. Those in the lower...ur o M em be r. G en er al S ta ff R eg io na l C om m an ds Fu nc tio na l C om m an ds P re si de nc y C ou nc il O pe ra tio ns (G 3) A dm in is...nc y C ou nc il O pe ra tio ns (G 3) A dm in is tra tio n/ Lo gi st ic s (G 1/ G 4) P es hm er ga M in is te r* Fi na nc e In sp ec to r G en er al

  1. Governance: The Mission Ingredient in Security Cooperation

    Science.gov (United States)

    2017-06-09

    change the norms, behaviors, and beliefs within the Colombian political elites resulting in support for counter violence and anti-terrorism efforts... legislation . In all of the scholarly writing found on the matter, they relied—and many of them heavily—on reforming SC/SA through more legislative ...ADRP 5-0. “An operational environmental frame consists of two parts—the current state of the operational environment and the desired end state of the

  2. Security Governance on Ecuador's Northern Border | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Two new initiatives to support STEM careers for women. Women in the developing world continue to face obstacles that limit their ability to establish careers and become leaders in the fields of science, technology, engineering, and mathematics (STEM). View moreTwo new initiatives to support STEM careers for women ...

  3. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... At the same time, mounting U.S. casualties and financial costs stimulated debate within the United States over whether the initial goals of the intervention -- a stable, democratic Iraq that is a partner in the global war...

  4. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    Operation Iraqi Freedom overthrew Saddam Hussein's regime, but during 2004-2007 much of Iraq was wracked by violence caused by Sunni Arab resentment and a related insurgency, resulting Sunni-Shiite...

  5. Geo-economics and geo-strategic agendas in the Security and Prosperity Partnership of North America (SPPNA questioning the Neo-liberal model

    Directory of Open Access Journals (Sweden)

    Jaime Preciado Coronado

    2009-10-01

    Full Text Available Burn in 2005, in the context of post-9/11 crisis, and eleven years past of NAFTA’s beginning functions, the SPPNA emphasizes the security agenda of the United States of America, with a partial vision of anti terrorism, the preventive war, and the homeland security based upon anti immigrants policies and “sealed” frontiers. The results of that Partnership means an aggressive inter-American policy (geostrategics against the left inspired governments in Latin-America, it also means a struggle against narcotic dealers and producers, that ends in the criminalization of the protestors social movements, and finally means a hardest control of the immigration policies, through the enhancement of military forces at the frontiers space. In the other hand, the SPPNA has a perverse impact on the Latin-American integration by the way of a kind of geoeconomics of fragmentation. The “Prosperity” agenda, suppose to adopt the free trade agreements within the neo-liberal orthodoxy, which means without a social agenda and against the communitarian experiences that are growing at Latin America. Prosperity is the key word in the USA hegemony upon the energetic and natural resources of the region.

  6. 41 CFR 50-210.1 - Coverage under the Walsh-Healey Public Contracts Act of truck drivers employed by oil dealers.

    Science.gov (United States)

    2010-07-01

    ...-Healey Public Contracts Act of truck drivers employed by oil dealers. 50-210.1 Section 50-210.1 Public...-210.1 Coverage under the Walsh-Healey Public Contracts Act of truck drivers employed by oil dealers... Interpretations No. 2 1 with respect to coverage under the Walsh-Healey Public Contracts Act of truck drivers...

  7. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  8. UNDERSTANDING TOWARDS TRADERS’ BUSINESS ETHICS OF ISLAM: A STUDY OF ACEH DEALERS IN KUALA LUMPUR

    Directory of Open Access Journals (Sweden)

    Muhammad Abdul Samad

    2014-08-01

    Full Text Available Islamic business ethics is one that should be the practice of Muslim traders, because Islam promotes this method for fairness, honesty and the benefit of people. Ethical values of Islam must be known and understood by all Muslim traders to avoid cheating that may oppress customers. This study uses qualitative methods and obtains data from the interviewers and observations. The study found that the majority of Aceh traders has understood the ethical businessmen in Islam which can be seen from the activities they are doing in each of its business practices. Aceh dealers are usually honest, fair, occupying commitment, hardworking and making efforts in business.

  9. Security, insecurity and health.

    Science.gov (United States)

    Coupland, Robin

    2007-03-01

    An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.

  10. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  11. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  12. 17 CFR 405.4 - Financial recordkeeping and reporting of currency and foreign transactions by registered...

    Science.gov (United States)

    2010-04-01

    ... reporting of currency and foreign transactions by registered government securities brokers and dealers. 405... reporting of currency and foreign transactions by registered government securities brokers and dealers... Currency and Foreign Transactions Reporting Act of 1970 shall comply with the reporting, recordkeeping and...

  13. 17 CFR 420.1 - Applicability.

    Science.gov (United States)

    2010-04-01

    ..., including the Appendices, is applicable to all persons that participate in the government securities market, including, but not limited to: government securities brokers and dealers, depository institutions that... authorities are exempt from this part. This exemption is not applicable to a broker, dealer, financial...

  14. GOOD GOVERNANCE AND TRANSFORMATION

    Directory of Open Access Journals (Sweden)

    Hans-Jürgen WAGENER

    2005-12-01

    Full Text Available Transformation of a totalitarian, basically administratively coordinated system into a democratic one that is coordinated predominantly by markets and competition has been triggered by, among others, the perception of a serious deficit in welfare and happiness. Public policy has a special task transforming the economic order by liberalisation, privatisation, stabilisation and the installation of institutions that are supportive for competition. After 15 years since transformation began, there are sufficiently differentiated success stories to test the hypothesis: it was good governance that is responsible for success and bad governance for failure. The empirical results support the “Lorenzetti hypothesis”: where freedom, security and trust prevail, the economy flourishes, where they are lacking, the costs of long-term investment are too high. The initial conditions of transition countries seem to be quite similar, nevertheless, even there one can discern good and bad governance. The extent of socialist lawfulness, planning security, cronyism and corruption differed widely between East Berlin and Tashkent. And a good deal of such variations can be found in the pre-socialist history of these countries. However, the main conclusion is that the co-evolution hypothesis states that both, welfare and good governance, go together.

  15. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  16. Regulatory Governance

    DEFF Research Database (Denmark)

    Kjær, Poul F.; Vetterlein, Antje

    2018-01-01

    Regulatory governance frameworks have become essential building blocks of world society. From supply chains to the regimes surrounding international organizations, extensive governance frameworks have emerged which structure and channel a variety of social exchanges, including economic, political...... by the International Transitional Administrations (ITAs) in Kosovo and Iraq as well as global supply chains and their impact on the garment industry in Bangladesh....

  17. Experimentalist governance

    NARCIS (Netherlands)

    Sabel, C.F.; Zeitlin, J.; Levi-Faur, D.

    2012-01-01

    A secular rise in volatility and uncertainty is overwhelming the capacities of conventional hierarchical governance and ‘command-and-control’ regulation in many settings. One significant response is the emergence of a novel, ‘experimentalist’ form of governance that establishes deliberately

  18. Remaking Governance.

    Science.gov (United States)

    Carver, John

    2000-01-01

    The Policy Governance model's philosophical foundations lie in Rousseau's social contract, Greenleaf's servant-leadership, and modern management theory. Policy Governance stresses primacy of the owner-representative role; full-board authority; superintendents as chief executive officers; authoritative prescription of "ends," bounded…

  19. Legitimacy and the Cost of Government

    DEFF Research Database (Denmark)

    Berggren, Niclas; Bjørnskov, Christian; Lipka, David

    2015-01-01

    While previous research documents a negative relationship between government size and economic growth, suggesting an economic cost of big government, a given government size generally affects growth differently in different countries. As a possible explanation of this differential effect, we......, in which two different measures of the size of government are interacted with government legitimacy, reveals that perceived legitimacy exacerbates a negative growth effect of government size in the long run. This could be interpreted as governments taking advantage of being regarded as legitimate in order...... to secure short-term support at a long-term cost to the economy....

  20. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  1. Interoperability, Enterprise Architectures, and IT Governance in Government

    OpenAIRE

    Scholl , Hans ,; Kubicek , Herbert; Cimander , Ralf

    2011-01-01

    Part 4: Architecture, Security and Interoperability; International audience; Government represents a unique, and also uniquely complex, environment for interoperation of information systems as well as for integration of workflows and processes across governmental levels and branches. While private-sector organizations by and large have the capacity to implement “enterprise architectures” in a relatively straightforward fashion, for notable reasons governments do not enjoy such luxury. For thi...

  2. The melding of drug markets in Houston after Katrina: dealer and user perspectives.

    Science.gov (United States)

    Kotarba, Joseph A; Fackler, Jennifer; Johnson, Bruce D; Dunlap, Eloise

    2010-07-01

    In the aftermath of Hurricane Katrina, the majority of routine activities in New Orleans were disrupted, including the illegal drug market. The large-scale relocation of New Orleans evacuees (NOEs), including many illegal drug users and sellers, to host cities led to a need for new sources of illegal drugs. This need was quickly satisfied by two initially distinct drug markets (1) drug dealers from New Orleans who were themselves evacuees and (2) established drug dealers in the host cities. To be expected, the two markets did not operate indefinitely in parallel fashion. This paper describes the evolving, operational relationship between these two drug markets over time, with a focus on Houston. We analyze the reciprocal evolution of these two markets at two significant points in time: at the beginning of the relocation (2005) and two years later (2007). The overall trend is towards a melding of the two drug markets, as evidenced primarily by decreases in drug-related violence and the cross-fertilization of drug tastes. We describe the process by which the two drug markets are melded over time, in order to seek a better understanding of the social processes by which drug markets in general evolve.

  3. Impact of California firearms sales laws and dealer regulations on the illegal diversion of guns.

    Science.gov (United States)

    Pierce, Glenn L; Braga, Anthony A; Wintemute, Garen J

    2015-06-01

    The available evidence suggests that more restrictive state firearm sales laws can reduce criminal access to guns. California has firearm-related laws that are more stringent than many other states and regulates its retail firearms dealers to a unique degree. This research seeks to examine the effect of more restrictive state gun laws and regulations on the illegal diversion of guns to criminals. Survival analyses are used to determine whether state firearm sales laws, particularly California's legal context and regulatory regime, impact the distribution of time-to-crime of recovered firearms in that state relative to other US states. USA. 225,392 traced firearms, where the first retail purchasers and the gun possessors were different individuals, recovered by law enforcement agencies between 2003 and 2006. The increased stringency of state-level firearms laws and regulations leads to consistently older firearms being recovered. California was associated with the oldest recovered crime guns compared with guns associated with other states. These patterns persisted regardless of whether firearms were first purchased within the recovery state or in another state. These findings suggest that more restrictive gun sales laws and gun dealer regulations do make it more difficult for criminals to acquire new guns first purchased at retail outlets. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  4. Renewing governance.

    Science.gov (United States)

    Loos, Gregory P

    2003-01-01

    Globalization's profound influence on social and political institutions need not be negative. Critics of globalization have often referred to the "Impossible Trinity" because decision-making must 1. respect national sovereignty, 2. develop and implement firm regulation, and 3. allow capital markets to be as free as possible. To many, such goals are mutually exclusive because history conditions us to view policy-making and governance in traditional molds. Thus, transnational governance merely appears impossible because current forms of governance were not designed to provide it. The world needs new tools for governing, and its citizens must seize the opportunity to help develop them. The rise of a global society requires a greater level of generality and inclusion than is found in most policy bodies today. Politicians need to re-examine key assumptions about government. States must develop ways to discharge their regulatory responsibilities across borders and collaborate with neighboring jurisdictions, multilateral bodies, and business. Concepts such as multilateralism and tripartism show great promise. Governments must engage civil society in the spirit of shared responsibility and democratic decision-making. Such changes will result in a renewal of the state's purpose and better use of international resources and expertise in governance.

  5. Nuclear Security Futures Scenarios

    International Nuclear Information System (INIS)

    Keller, Elizabeth James Kistin; Warren, Drake Edward; Hayden, Nancy Kay; Passell, Howard D.; Malczynski, Leonard A.; Backus, George A.

    2017-01-01

    This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.

  6. Nuclear Security Futures Scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Keller, Elizabeth James Kistin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hayden, Nancy Kay [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Passell, Howard D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-01-01

    This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.

  7. Governance or Governing – the Missing Link?

    Directory of Open Access Journals (Sweden)

    Luminiţa Maria Crăciun

    2010-07-01

    , of giving a sense of responsibility to the public and private sectors, of imposing, observing and materializing a real commitment for preventing and fighting corruption, the risk of which may be a threat to national security. Human governance creates a favorable environment for human development and elimination of poverty. If the preoccupations of the governance institutions are centered on the interests, needs, and fundamental rights of the population, progress may be achieved in the fight against poverty. If a country tries to apply economic policies in order to promote a beneficial increase to the poor ones, along with programs meant to help reach the targeted goals, the effects may be attenuated or annulled, when the governance institutions are ineffective or passive. The conclusion is that the governance is the missing link between the efforts of struggle against poverty and reaching the objective of poverty reduction.

  8. Organizational governance

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Klein, Peter G.

    This chapter reviews and discusses rational-choice approaches to organizational governance. These approaches are found primarily in organizational economics (virtually no rational-choice organizational sociology exists), particularly in transaction cost economics, principal-agent theory...

  9. Waste governance

    CSIR Research Space (South Africa)

    Oelofse, Suzanna HH

    2018-06-01

    Full Text Available of governance in Africa. The next section focuses on regulation, and the status of the regulatory frameworks in different African countries. Shortcomings in the regulatory framework are highlighted through examples in various countries. Specific policy...

  10. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  13. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  14. Corporate Governance

    Directory of Open Access Journals (Sweden)

    Dragoș-Mihail Daghie

    2011-05-01

    Full Text Available The purpose of this study is to analyze and understand the recently introduced form of managementof a company limited by shares. The Law no. 441/2006, which fundamentally amended Company Law,created this form of controlling the company, the corporate governance, but the legislation does not explicitlydefine what it wants to achieve through this instrument. This topic is recent in research as the theme ofgerman-roman commercial law systems (in French corporate governance system was introduced in 1966 andin Romania in 2006 but in terms of Anglo-Saxon law, the topic has been addressed years since 1776 (AdamSmith: The Wealth of Nations The concept of corporate governance would like, as a result, to establish somerules that companies must comply in order to achieve effective governance, transparent and beneficial forboth shareholders and for the minority. Corporate governance is a key element with an aim at improvingefficiency and economic growth in full accordance with the increase of investors’ confidence. Corporategovernance assumes a series of relationship between the company management, leadership, shareholders andthe other people concerned. Also corporate governance provides for that structure by means of which thecompany’s targets are set out and the means to achieve them and also the manner how to monitor such.

  15. 26 CFR 1.453A-1 - Installment method of reporting income by dealers on personal property.

    Science.gov (United States)

    2010-04-01

    ... sale on the installment plan. For purposes of the regulations under section 453A— (1) The term “dealer...)(2) of this section, the term “sale on the installment plan” means— (i) A sale of personal property by the taxpayer under any plan for the sale of personal property, which plan, by its terms and...

  16. 31 CFR 103.140 - Anti-money laundering programs for dealers in precious metals, precious stones, or jewels.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Anti-money laundering programs for... FOREIGN TRANSACTIONS Anti-Money Laundering Programs Anti-Money Laundering Programs § 103.140 Anti-money...) Anti-money laundering program requirement. (1) Each dealer shall develop and implement a written anti...

  17. 17 CFR 405.1 - Application of part to registered brokers and dealers and to financial institutions; transition...

    Science.gov (United States)

    2010-04-01

    ... notes) for such quarter, prepared in accordance with generally accepted accounting principles. [52 FR... provisions of those rules relating to OTC derivatives dealers, constitutes compliance with this part. (b) A... § 405.2, for the month and the quarter during which they were first required to comply with part 402 of...

  18. 75 FR 71391 - Implementation of Conflicts of Interest Policies and Procedures by Swap Dealers and Major Swap...

    Science.gov (United States)

    2010-11-23

    ... regulations establish conflicts of interest requirements for swap dealers (SDs) and major swap participants...-AC96 and SD-MSP Conflicts of Interest, by any of the following methods: Agency Web site, via its... mandates that the required conflicts of interest systems and procedures ``address such other issues as the...

  19. 17 CFR 240.17a-3 - Records to be made by certain exchange members, brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ...; and (C) System order means any order or other communication or indication submitted by any customer... change in the name or address of the customer or owner, the member, broker or dealer furnished a notification of that change to the customer's old address, or to each joint owner, and the associated person...

  20. 17 CFR 240.17a-4 - Records to be preserved by certain exchange members, brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... readable projection or production of micrographic media or electronic storage media images and for... are subject to rules of a self-regulatory organization of which the member, broker or dealer is a... may be immediately produced or reproduced on “micrographic media” (as defined in this section) or by...

  1. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  2. Government science in postwar America: Henry A. Wallace, Edward U. Condon, and the transformation of the National Bureau of Standards, 1945-1951.

    Science.gov (United States)

    Lassman, Thomas C

    2005-03-01

    In the fall of 1945, Secretary of Commerce Henry Wallace handpicked Edward Condon, a respected theoretical physicist, to become director of the National Bureau of Standards. Already regarded by many academic and industrial scientists as a second-rate research institution, the Bureau had deteriorated further during the Great Depression. An ardent New Dealer who favored government action to prevent anticompetitive behavior in the marketplace, Wallace claimed that giant corporations leveraged their extensive patent holdings and research capabilities to manipulate markets and restrict competition at the expense of smaller firms without similar resources. Through a revitalized Bureau of Standards, Wallace intended to mitigate monopolistic behavior among large companies by transforming the Department of Commerce into an effective clearinghouse for scientific research that would stimulate technological innovation in small businesses. The Bureau's postwar expansion, however, foundered on congressional efforts to dismantle the legacies of the New Deal, Condon's lack of commitment to the technical requirements of the small business community, and the intense competition for resources within an institutionally pluralist federal research establishment dominated by the exigencies of the Cold War. Without sufficient financial support from congressional appropriations committees, Condon turned to the military to fund new research programs at the Bureau of Standards. These programs, however, owed their institutional growth to the demands of the national security state, not to the fading influence of Henry Wallace's New Deal liberalism.

  3. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  4. Tax Governance

    DEFF Research Database (Denmark)

    Boll, Karen; Brehm Johansen, Mette

    to wider international trends within tax administration, especially concerning the development of risk assessments and internal control in the corporations and a greater focus on monitoring of these elements by the tax authorities. Overall, the working paper concludes that Tax Governance as a model......This working paper presents an analysis of the experiences of Cooperative Compliance in Denmark. Cooperative Compliance denotes a specific kind of collaborative program for the regulation of large corporate taxpayers by the tax authorities. Cooperative Compliance programs have been implemented...... in several countries worldwide. In Denmark the program is called Tax Governance. Tax Governance has been studied using qualitative method and the analyses of the working paper build on an extensive base of in-depth interviews – primarily with tax directors from corporations participating in the program...

  5. World governance for energy

    International Nuclear Information System (INIS)

    Kerebel, C.; Keppler, J.H.

    2009-01-01

    As energy is a strategic stake for industrial societies through supply security, economical competitiveness and environmental performance, it is well-founded and useful to consider the way that energy production and consumption are organized. This document introduces the notion of energy governance and its different interpretations, then analyses its stakes and challenges (petroleum, natural gas, investment needs), and discusses some of the debates already in progress, such as the UNO's negotiations on greenhouse gas emission reduction or the impact of the WTO talks on energy exchanges

  6. American National Government: An Overview

    National Research Council Canada - National Science Library

    Kaiser, Frederick M

    2003-01-01

    ...; judicial independence; institutional supports; checks and balances and shared responsibilities in terms of lawmaking, national security policy, executive and judicial appointments, and criminal investigations; and the Federal Government's dispersed and decentralized organization. This report, which examines these characteristics, will be updated as developments require.

  7. Mobilizing Government

    DEFF Research Database (Denmark)

    Wang, Cancan; Medaglia, Rony; Jensen, Tina Blegind

    2016-01-01

    The nature of inter-organizational collaboration between government and other stakeholders is rapidly changing with the introduction of open social media (OSM) platforms. Characterized by a high degree of informality as well as a blurred personal/professional nature, OSM can potentially introduce...... changes and tensions in the well-established routines of the public sector. This paper aims at shedding light on such changes, presenting findings from a study on the use of an OSM platform, WeChat, in an interorganizational collaboration project between government, university, and industry stakeholders...

  8. Africa: Mineral resources, environment, and governance | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-01-25

    Jan 25, 2011 ... Africa: Mineral resources, environment, and governance ... benefits the poor, more effective social and environmental policies, and respect for human ... Who should claim responsibility for local crime prevention and security?

  9. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  10. Applicable Law on Demobilized and Dematerialized Securities

    Directory of Open Access Journals (Sweden)

    Wael Saghir

    2017-09-01

    Full Text Available In this paper Wael Saghir examines the priority in the business and financial worlds for companies to pursue reduced transaction costs, creating a trend towards demobilization or dematerialization of securities. His paper explains the nature of securities and the governing laws needed to resolve problems of conflict of law rules related to securities.

  11. Enhancing Food Security through Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...

  12. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  13. The epidemiology of Salmonella infection of calves: the role of dealers.

    Science.gov (United States)

    Wray, C.; Todd, N.; McLaren, I.; Beedell, Y.; Rowe, B.

    1990-01-01

    Salmonellas were detected in the environment of 10 of the 12 calf dealers' premises studied. The cleaning and disinfection routines were often ineffective and salmonellas were isolated from 7.6% and 5.3% of the wall and floor samples before disinfection and 6.8% and 7.6% afterwards. Eight different salmonella serotypes were detected, of which the commonest were Salmonella typhimurium, predominantly phage type DT204C, and S. dublin. Plasmid profiles were used to fingerprint S. typhimurium DT204C and the results indicated that with the exception of one of the premises, prolonged salmonella-persistence in the environment was not occurring. Three separate epidemics of salmonellosis in calves were studied by use of plasmid profile analysis. The results illustrated the role of delers, and their subcontractors, in the dissemination of salmonellas. The study concludes with suggestions for methods to reduce the spread of salmonellas in the calf marketing chain. PMID:2209734

  14. Identification of customer satisfaction in services: a study on agribusiness dealers

    Directory of Open Access Journals (Sweden)

    Mario Gilberto Lütkemeyer Filho

    2015-12-01

    Full Text Available Objective – This paper presents an analysis of service factors that impact customer satisfaction with dealers in the sugarcane segment in Sao Paulo state – Brazil. Design/methodology/approach – The research method is descriptive quantitative, based on survey. Data is secondary gathered from the tractor-making company’s database, with n = 88. Tools used for multivariate statistical analysis were factor analysis and correspondence analysis. Findings – The results revealed a reduction in latent variables into two components: trust and relationship. The correspondence analysis presents association among variables “cost-benefit of spare parts” and “treated fairly and honestly”. Practical implications – Despite the evidence of a relationship between the results and the information available in the literature, results cannot be generalized, since theory doesn´t fully describes the investigated sector. Future research may advance towards validating if the emerged variables are relevant on the strategic decision making process for this segment.

  15. Evaluating awareness and practices pertaining to radioactive waste management among scrap dealers in Delhi, India.

    Science.gov (United States)

    Makkar, Nayani; Chandra, Tany; Agrawal, Prachi; Bansal, Harshit; Singh, Simranjeet; Anand, Tanu; Gupta, Mannan Kumar; Kumar, Rajesh

    2014-01-01

    With nuclear technology rapidly taking the spotlight in the last 50 years, radiation accidents seem to be a harsh reality of the modern world. The Mayapuri Radiation accident of 2010 was the worst radiation accident India has yet dealt with. Two years thereafter, we designed a study to assess the awareness and practices regarding radioactive waste among scrap dealers aiming to assess deficiencies in radiation disaster preparedness. A community based cross-sectional study. The study population consisted of 209 volunteers (from 108 scrap dealerships) including 108 shop-owners and 101 workers segregated as Group A consisting of 54 dealerships in Mayapuri and Group B of 54 dealerships from the rest of the city. Subjects were then interviewed using a semi-structured questionnaire. Awareness about radioactive waste varied significantly with level of education (p = 0.024), Kuppuswamy's socio-economic scale (p = 0.005), age of the scrap dealer (p = 0.049) and his work experience (p = 0.045). The larger dealerships in Mayapuri were more aware about radioactive waste (p = 0.0004), the accident in 2010 (p = 0.0002), the symbol for radiation hazard (p = 0.016), as well as the emergency guidelines and the agencies to contact in the event of a radiation accident. Our findings seem to signify that while governmental and non-governmental agencies were successful in implementing prompt disaster response and awareness programs, the community continues to be inadequately prepared. These go on to suggest that though concerted awareness and training programs do benefit the affected community, economic and social development is the key to disaster prevention and mitigation.

  16. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  17. Global Governance: Old and New Issues

    OpenAIRE

    Gary Clyde Hufbauer

    2008-01-01

    This paper opens with a short recollection of the Kiel Week Conference of 2002, recorded in a volume edited by Horst Siebert, titled Global Governance: An Architecture for the World Economy. Assess-ments and forecasts made at that time are scored against subsequent developments. Security relations between the great powers are asserted to define the space for global economic governance. Over the next thirty years, the security context is not likely to provide the same inspiration for global ec...

  18. Bank Governance

    OpenAIRE

    Laura Ard; Alexander Berg

    2010-01-01

    Principles of good governance have been a major component of international financial standards and are seen as essential to the stability and integrity of financial systems. Over the past 10 years much energy and attention have gone to improving the ability of company boards, managers, and owners to prudently navigate rapidly changing and volatile market conditions. So, how to explain the ...

  19. Government Organizations

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Salskov-Iversen, Dorte

    2017-01-01

    , with clearly defined boundaries between the public and private; and in terms of polycentrism, where power and authority are seen as dispersed among state and nonstate organizations, including business and civil society organizations. Globalization and new media technologies imply changes in the relationship...... democracy and the public sphere; and discourse approaches to studying the intersections of government, organizational change, and information and communication technology....

  20. Corporate Governance

    International Development Research Centre (IDRC) Digital Library (Canada)

    Andy Knight; David Malone; Faith Mitchell. Finance and Audit Committee. Members: Denis Desautels (Chairman); Ahmed Galal;. Frieda Granot; Elizabeth Parr-Johnston; Andrés Rozental;. Gordon Shirley. Governance Committee. Members: The Honourable Barbara McDougall (Chairman);. Claude-Yves Charron; Denis ...

  1. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Global Positioning System : significant challenges in sustaining and upgrading widely used capabilities : report to the Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, House of Representatives.

    Science.gov (United States)

    2009-04-01

    The Global Positioning System (GPS), which provides positioning, navigation, and timing data to users worldwide, has become essential to U.S. national security and a key tool in an expanding array of public service and commercial applications at home...

  4. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  5. Plural Governance

    DEFF Research Database (Denmark)

    Mols, Niels Peter; Hansen, Jesper Rosenberg; Villadsen, Anders Ryom

    We suggest that both making and buying the same product or service has several effects on market performance. A model is developed and tested by use of 170 answers gathered from the Danish municipalities. The results support the hypotheses that both making and buying: (1) moderates the negative r...... on how the plurality is measured. The results indicate that internal production may facilitate effective governance of the relationships with suppliers. Implications for research on firm boundaries and for practice are also discussed....

  6. IT Governance

    OpenAIRE

    Šimková, Hana

    2008-01-01

    IT governance (control of information technology) is a frequently discussed topic today which represents current needs to take control of IT, judge impacts of all resolutions and lead up investments running to the information technology. It is very important for both small and large organizations to have IT which encourages business strategy and helps to meet objectives of a company. The theoretical part of this paper is focused on characterization of the main areas, benefits, rules and vario...

  7. 17 CFR 240.15c3-1e - Deductions for market and credit risk for certain brokers or dealers (Appendix E to 17 CFR 240...

    Science.gov (United States)

    2010-04-01

    ... credit risk for certain brokers or dealers (Appendix E to 17 CFR 240.15c3-1). 240.15c3-1e Section 240....15c3-1(c)(2)(vi) and (c)(2)(vii) and to compute deductions for credit risk pursuant to this Appendix E... the broker or dealer will use to calculate deductions for market and credit risk on those categories...

  8. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  9. Mapping Criminal Governance in African Cities | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Mapping Criminal Governance in African Cities. This grant will allow the Institute for Security Studies (ISS), through its Organized Crime and Money Laundering Programme (OCML), to explore the causal links between weak state authority and the emergence of criminal governance ... Profile of crime markets in Dakar.

  10. Government Certification and Accreditation: Make a Choice

    Science.gov (United States)

    Miles, Tracy L.

    2009-01-01

    One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…

  11. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  12. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  13. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  14. Gender Discrimination in Retail Shops’ Personnel: The Case of General Dealer Shops at Murambinda Growth Point, Buhera, Zimbabwe

    OpenAIRE

    Nyevero Maruzani

    2013-01-01

    The purpose of this study was to examine the factors that contribute to gender discrimination in retail shops, focusing on general dealer shops at Murambinda Growth point in Buhera, Zimbabwe. Despite the fact that policy makers continue to grapple with possible strategies to promote and advance progress towards equal opportunities for women, gender discrimination in retail shops still exists. Recent research also shows that workplace discrimination continues to be an impediment to gender equa...

  15. FOOD SECURITY IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Silviu STANCIU

    2015-12-01

    Full Text Available The increasing world population, the limitation of the natural availability for food production, the climate issues and the food consumption need for modification imposed a continuous updating of the food security concept. Although Romania has sufficient natural resources, which may ensure, by means of proper exploitation, the population’s food needs, the lack of a unitary approach at the government level, materialized in the dependence on imports and in fluctuations in the agro-food production, leads to a re-evaluation of national food needs. National food security may be affected by a series of risks and threats, which appeared due to an imbalance connected with the availability, the utility and the stability of the agro-food sector, interdependent elements that must be functional. The present article proposes an analysis of food security in Romania, with a short presentation of the concept in an international context.

  16. The Reluctance of Civil Law Countries in Adopting “the Without Breach of Peace” Standard of UCC Article 9: Evidence from National and International Legal Instruments Governing Secured Transactions

    DEFF Research Database (Denmark)

    Gikay, Asress Adimi; Stanescu, Catalin Gabriel

    2017-01-01

    been shaped by courts on a case-by-case basis. In reforming their secured transactions laws and to enhance access to credit, continental legal systems have shown great reception to Article 9 by adopting the unitary concept and functional approach to security interests, introducing private enforcement....... This article concludes that the alternatives of the “without breach of peace” standard prevailing in continental legal systems undermine the privilege of the secured creditor, pose enforcement problems (such as uncertainty of creditors’ rights and possible abuses against consumer debtors), and restrain out...... international legal instruments), this article demonstrates that continental European legal systems are generally apprehensive with the “without breach of peace” standard. Thus, they are reluctant to transplant it to their legislation and try to either modify it or replace it with different legal requirements...

  17. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.

  18. Governability in Contemporary Mexico

    Directory of Open Access Journals (Sweden)

    Leonardo Curzio Gutiérrez

    1998-04-01

    Full Text Available Given the difficulties to establish a concept of governability and the frequent ideological usage of the term, it is much more operative to turn to the principle of governability, in the broad sense, which supports itself on five pillars: the political legitimacy of the government, the governmental efficiency to attend to the demands of society, the existence of shared social project, the agreement with the principle special interest groups, and international viability. The analysis of the structure and relevance of these five points during the long period of political transition that Mexico underwent between 1988 and 1997 shows how it was possible for this country to play off certain factors against each other in order to secure governability and safeguard against the consequences of any resultant imbalances. Between 1998-1993, the government of Salinas de Gotari based itself on the viability of a neoliberal project within an international context, and on this projectís attention to domestic demands as well as on the governmentís pact with elites. Institutional integration and legitimacy made up, then, for a process of discreet liberalization and the lack of democratic electoral commitment, which culminated in the PRI’s 1994 elections victory.The assassination of Colosia, though, and the appearance of the EZLN and the subsequent crisis surrounding the peso’s devaluation that accompanied Ernesto Zedilloís rise to power soon led to the collapse of those pillars of support. Crowning the process of the silenttransition were the elections of 1997, which makes it possible to say that in Mexico today there are now smooth elections, but that reform of the State is still unresolved —a subject that includes the reduction of the president’s competence. Seen in the short term, the most direct threats to Mexico’s governability will come as a result of the lack of attention to those demands of society’s underprivileged and the ill

  19. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  20. Federal Funding for Health Security in FY2017.

    Science.gov (United States)

    Boddie, Crystal; Watson, Matthew; Sell, Tara Kirk

    2016-01-01

    This latest article in the Federal Funding for Health Security series assesses FY2017 US government funding in 5 domains critical to strengthening health security: biosecurity, radiological and nuclear security, chemical security, pandemic influenza and emerging infectious disease, and multiple-hazard and general preparedness.

  1. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  2. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  3. Perspectives on water security in the South African context

    CSIR Research Space (South Africa)

    Funke, Nicola S

    2017-12-01

    Full Text Available This presentation focuses on different perspectives of water security in the South Africa context. The authors link a number of key international perspectives on the topic of water security to official South African government and academic discourse...

  4. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... America, and the Caribbean with funds from the Government of Canada's fast-start financing. ... Water management and food security in vulnerable regions of China.

  5. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  6. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  7. Report of the DHS Small Vessel Security Institute

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  8. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  9. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  10. Governing Engineering

    DEFF Research Database (Denmark)

    Buch, Anders

    2012-01-01

    Most people agree that our world face daunting problems and, correctly or not, technological solutions are seen as an integral part of an overall solution. But what exactly are the problems and how does the engineering ‘mind set’ frame these problems? This chapter sets out to unravel dominant...... perspectives in challenge per-ception in engineering in the US and Denmark. Challenge perception and response strategies are closely linked through discursive practices. Challenge perceptions within the engineering community and the surrounding society are thus critical for the shaping of engineering education...... and the engineering profession. Through an analysis of influential reports and position papers on engineering and engineering education the chapter sets out to identify how engineering is problematized and eventually governed. Drawing on insights from governmentality studies the chapter strives to elicit the bodies...

  11. Governing Engineering

    DEFF Research Database (Denmark)

    Buch, Anders

    2011-01-01

    Abstract: Most people agree that our world faces daunting problems and, correctly or not, technological solutions are seen as an integral part of an overall solution. But what exactly are the problems and how does the engineering ‘mind set’ frame these problems? This chapter sets out to unravel...... dominant perspectives in challenge perception in engineering in the US and Denmark. Challenge perception and response strategies are closely linked through discursive practices. Challenge perceptions within the engineering community and the surrounding society are thus critical for the shaping...... of engineering education and the engineering profession. Through an analysis of influential reports and position papers on engineering and engineering education the chapter sets out to identify how engineering is problematized and eventually governed. Drawing on insights from governmentality studies the chapter...

  12. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  13. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  14. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  15. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    .... The privatization and outsourcing of activities that were once solely the province of sovereign governments provide challenges and opportunities to planners and analysts involved in national security strategy...

  16. Reinventing government: Reinventing Hanford

    International Nuclear Information System (INIS)

    Mayeda, J.T.

    1994-05-01

    The Hanford Site was established in 1943 as one of the three original Manhattan Project locations involved in the development of atomic weapons. It continued as a defense production center until 1988, when its mission changed to environmental restoration and remediation. The Hanford Site is changing its business strategy and in doing so, is reinventing government. This new development has been significantly influenced by a number of external sources. These include: the change in mission, reduced security requirements, new found partnerships, fiscal budgets, the Tri-Party agreement and stakeholder involvement. Tight budgets and the high cost of cleanup require that the site develop and implement innovative cost saving approaches to its mission. Costeffective progress is necessary to help assure continued funding by Congress

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. Water security in South Africa: perceptions on public expectations ...

    African Journals Online (AJOL)

    Water security in South Africa: perceptions on public expectations and municipal ... will in government, a need to restore citizen trust in government intention and capability ... services, and a failure to up-scale existing water re-use technology.

  19. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  20. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  1. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Child poverty vs Medicare and Social Security.

    Science.gov (United States)

    Waldman, H B

    1997-01-01

    The series of government safety net programs provides economic security primarily to older populations. In this period of competition for limited federal resources, the need to create a public awareness of the continuing and growing poverty of children is emphasized.

  5. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  6. Amplifying Security Education in the Laboratory

    National Research Council Canada - National Science Library

    Irvine, Cynthia

    1999-01-01

    Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...

  7. Bibliography for computer security, integrity, and safety

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A bibliography of computer security, integrity, and safety issues is given. The bibliography is divided into the following sections: recent national publications; books; journal, magazine articles, and miscellaneous reports; conferences, proceedings, and tutorials; and government documents and contractor reports.

  8. Homeland Security: The Department of Defense's Role

    National Research Council Canada - National Science Library

    Bowman, Steve

    2003-01-01

    ...) more closely with federal, state, and local agencies in their homeland security activities. DoD resources are unique in the government, both in their size and capabilities, and can be applied to both deter and respond to terrorist acts...

  9. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  10. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  11. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  12. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  13. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    . The Canadian International Food Security Research Fund(CIFSRF) is a program of Canada's International Development Research. Centre (IDRC) undertaken with the financial support of the. Government of Canada provided through Foreign ...

  14. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  15. 77 FR 25007 - Order Temporarily Exempting Broker-Dealers From the Recordkeeping, Reporting, and Monitoring...

    Science.gov (United States)

    2012-04-26

    ...'' provided in Rule 13h- 1(a)(6), but for the sole purpose of determining whether a person is a large trader... the Securities Exchange Act of 1934 (``Exchange Act'') concerning large trader reporting to assist the... persons are referred to as ``large traders'').\\1\\ \\1\\ See Securities Exchange Act Release No. 64976 (July...

  16. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  17. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  18. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  19. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  20. Engineering governance: introducing a governance meta framework.

    OpenAIRE

    Brand, N.; Beens, B.; Vuuregge, E.; Batenburg, R.

    2011-01-01

    There is a need for a framework that depicts strategic choices within an organisation with regard to potential governance structures. The governance meta framework provides the necessary structure in the current developments of governance. Performance as well as conformance are embedded in this framework and provide the balance for all governance domains. (aut.ref.)