WorldWideScience

Sample records for greater adolescent security

  1. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  2. Secure equality and greater-than tests with sublinear online complexity

    DEFF Research Database (Denmark)

    Lipmaa, Helger; Toft, Tomas

    2013-01-01

    Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required by many MPC applications. We propose two equality tests for ℓ-bit values with O(1) online...

  3. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    Science.gov (United States)

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  4. Transition secured? A follow-up study of adolescents who have left secure residential care

    NARCIS (Netherlands)

    Harder, Annemiek; Knorth, Erik J.; Kalverboer, Margrite E.

    2011-01-01

    Many adolescents who make the transition to adulthood experience problems after their departure from secure residential care. Research suggests that these young people are often in need of support after they have left secure care. Little is known about the experiences and perceptions of adolescents

  5. Education secured? The school performance of adolescents in secure residential youth care

    NARCIS (Netherlands)

    Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.

    Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Therefore, the aim of the present study is to assess adolescents' academic achievement during

  6. Parental attachment style: examination of links with parent secure base provision and adolescent secure base use.

    Science.gov (United States)

    Jones, Jason D; Cassidy, Jude

    2014-01-01

    The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.

  7. Validity evidence for the Security Scale as a measure of perceived attachment security in adolescence.

    Science.gov (United States)

    Van Ryzin, Mark J; Leve, Leslie D

    2012-04-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  8. Frequent marijuana use is associated with greater nicotine addiction in adolescent smokers.

    Science.gov (United States)

    Rubinstein, Mark L; Rait, Michelle A; Prochaska, Judith J

    2014-08-01

    Marijuana and tobacco are the substances used most commonly by adolescents and co-occurring use is common. Use of one substance may potentiate the addictive properties of the other. The current study examined the severity of nicotine addiction among teen smokers as a function of co-occurring marijuana use. Participants were 165 adolescents (13-17 years old) who reported smoking at least 1 cigarette per day (CPD) in the past 30 days. General linear models examined the association of marijuana use with multiple measures of nicotine addiction including the Modified Fagerström Tolerance Questionnaire (mFTQ), Hooked on Nicotine Checklist (HONC), ICD-10, and the Nicotine Dependence Syndrome Scale (NDSS). The adolescent sample (mean age=16.1 years, SD=0.95) averaged 3.0 CPD (SD=3.0) for 1.98 years (SD=1.5). Most (79.5%) also smoked marijuana in the past 30 days. In models controlling for age, daily smoking status, and years of tobacco smoking, frequency of marijuana use accounted for 25-44% of the variance for all four measures of adolescent nicotine dependence. Marijuana use was associated with greater reported nicotine addiction among adolescent smokers. The findings suggest a role of marijuana in potentiating nicotine addiction and underscore the need for treatments that address both smoked substances. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. Dyslipidemia and Food Security in Low-Income US Adolescents: National Health and Nutrition Examination Survey, 2003-2010.

    Science.gov (United States)

    Tester, June M; Laraia, Barbara A; Leung, Cindy W; Mietus-Snyder, Michele L

    2016-02-11

    Low levels of food security are associated with dyslipidemia and chronic disease in adults, particularly in women. There is a gap in knowledge about the relationship between food security among youth and dyslipidemia and chronic disease. We investigated the relationship between food security status and dyslipidemia among low-income adolescents. We analyzed data from adolescents aged 12 to 18 years (N = 1,072) from households with incomes at or below 200% of the federal poverty level from the National Health and Nutrition Examination Survey (NHANES) 2003-2010. We used logistic regression to examine the relationship between household food security status and the odds of having abnormalities with fasting total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), serum triglycerides (TGs), high-density lipoprotein cholesterol (HDL-C), TG/HDL-C ratio, and apolipoprotein B (Apo B). Models included age, sex, race/ethnicity, smoking status, partnered status in the household, and maternal education, with additional adjustment for adiposity. Household food security status was not associated with elevated TC or LDL-C. Adolescents with marginal food security were more likely than food-secure peers to have elevated TGs (odds ratio [OR] = 1.86; 95% confidence interval [CI], 1.14-3.05), TG/HDL-C ratio (OR = 1.74; 95% CI, 1.11-2.82), and Apo B (OR = 1.98; 95% CI, 1.17-3.36). Female adolescents with marginal food security had greater odds than male adolescents of having low HDL-C (OR = 2.69; 95% CI, 1.14-6.37). No elevated odds of dyslipidemia were found for adolescents with low or very low food security. Adjustment for adiposity did not attenuate estimates. In this nationally representative sample, low-income adolescents living in households with marginal food security had increased odds of having a pattern consistent with atherogenic dyslipidemia, which represents a cardiometabolic burden above their risk from adiposity alone.

  10. Coping Skills Help Explain How Future-Oriented Adolescents Accrue Greater Well-Being Over Time.

    Science.gov (United States)

    Chua, Li Wen; Milfont, Taciano L; Jose, Paul E

    2015-11-01

    Adolescents who endorse greater levels of future orientation report greater well-being over time, but we do not know the mechanism by which this happens. The present longitudinal study examined whether both adaptive as well as maladaptive coping strategies might explain how future orientation leads to ill-being and well-being over time in young New Zealanders. A sample of 1,774 preadolescents and early adolescents (51.9 % female) aged 10-15 years at Time 1 completed a self-report survey three times with 1 year intervals in between. Longitudinal mediation path models were constructed to determine whether and how maladaptive and adaptive coping strategies at Time 2 functioned as mediators between future orientation at Time 1 and ill-being and well-being at Time 3. Results showed that future orientation predicted lower maladaptive coping, which in turn predicted lower substance use and self-harming behavior. All three well-being outcomes (i.e., happiness with weight, vitality, and sleep) were consistently predicted by future orientation, and all three pathways were mediated by both lower maladaptive and higher adaptive coping strategies (with the exception of happiness with weight, which was mediated only by lower maladaptive coping). The results suggest that several pathways by which future orientation leads to greater well-being occurs through an increased use of adaptive coping, a decreased use of maladaptive coping, or both.

  11. Adolescent gambling in greater Athens area: a cross-sectional study.

    Science.gov (United States)

    Anagnostopoulos, Dimitris C; Lazaratou, Helen; Paleologou, Mina P; Peppou, Lily E; Economou, Marina; Malliori, Melpomeni; Papadimitriou, George N; Papageorgiou, Charalampos

    2017-11-01

    Problem gambling in adolescents has recently emerged as a pressing public health concern. In this context and in light of the pervasive financial crisis in Greece, the present study aimed to explore adolescents' gambling involvement in Athens region to estimate the prevalence of its problematic form and to identify its risk/protective factors. A total of 2141 students were recruited from a representative sample of 51 schools located in greater Athens area. The presence of problem gambling was assessed through the use of the DSM-IV-MR-J questionnaire. Data were collected in the form of a self-reported questionnaire during one school hour. Results indicate that 1-year prevalence of high severity problem gambling was found to be 5.6%. Regarding the risk factors for problem gambling; male gender, parental engagement with gambling activities, living without the parents, low grades at school, foreign nationality and the referent absence of availability of food in the household, increased the risk of suffering from the disorder. Gambling behavior among adolescents constitutes a problem in Greece and highlights the need for designing and implementing appropriate preventive interventions, especially amid the ongoing financial crisis.

  12. Adolescent Appraisals of Family Security as a Mediator of the Effect of Family Instability on Adolescent Self-Esteem

    OpenAIRE

    Merkaš, Marina

    2014-01-01

    The aim of this two-wave study was to examine the mediating role of adolescent appraisals of family security in the relation between family instability and adolescent self-esteem in a sample of 377 adolescents and their mothers. Mothers' reports of family instability at Time 1 were significantly and positively associated with adolescent appraisals of family insecurity at Time 1 and Time 2. Adolescent self-esteem at Time 2 was significantly and negatively related to family...

  13. An Investigation of the Factors Related to Low Parent-Adolescent Attachment Security in Taiwan.

    Science.gov (United States)

    Chen, Chen-Jung; Sung, Huei-Chuan; Chen, Yi-Chang; Wang, Chih-Hung

    2017-09-01

    Adolescence may involve increases in many behavioral problems and psychosocial maladaptation. Adolescents must successfully cope with these challenges to achieve positive developmental milestones. To investigate whether low parental attachment security among adolescents in Taiwan is associated with their demographic characteristics, psychosocial maladaptation, and depression. A cross-sectional survey. A total of 335 adolescents completed the questionnaires. The Inventory of Parent and Peer Attachment, the Chinese version of the Youth Self-Report, and the Beck Depression Inventory-II were used to survey the participants. Correlation and multiple linear regressions, using low attachment security as the response variable, were used in the statistical analysis. The prevalence of Taiwanese adolescents with low parental attachment security was 38.5%. Low parental attachment security in adolescents was significantly associated with parental remarriage status and psychosocial maladaptation. By considering these risk factors, nursing educators and nurses could develop effective interventions to strengthen parent-adolescent attachment security.

  14. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  15. Factors influencing the adolescent pregnancy rate in the Greater Giyani Municipality, Limpopo Province – South Africa

    Directory of Open Access Journals (Sweden)

    Lenny Mushwana

    2015-01-01

    Full Text Available A quantitative, descriptive and explorative survey was conducted to determine factors that influence adolescent pregnancy rate among teenage girls (n = 147 attending four high schools in the Greater Giyani Municipality in South Africa. Data was collected using a validated questionnaire which had a reliability of 0.65. Response frequency distributions, two-way frequency tables, Chi-square tests and Cochran–Armitage Trend Tests were used to determine the effect with the demographic characteristics of participants. Participants reported that health services were not conveniently available for them. Their relationship with nurses was poor (p < 0.05 as reported by 73% of participants with regard to maintenance of confidentiality. Participants reported key psychosocial variables such as inadequate sexual knowledge (61%, changing attitudes towards sex (58.9% and peer pressure (56.3% as contributory to high pregnancy rate. Recommendations were made to improve school health services, reproductive education in school curricula focussing on reproductive health, sexuality and guidance for future research.

  16. Dyslipidemia and Food Security in Low-Income US Adolescents: National Health and Nutrition Examination Survey, 2003–2010

    Science.gov (United States)

    Laraia, Barbara A.; Leung, Cindy W.; Mietus-Snyder, Michele L.

    2016-01-01

    Introduction Low levels of food security are associated with dyslipidemia and chronic disease in adults, particularly in women. There is a gap in knowledge about the relationship between food security among youth and dyslipidemia and chronic disease. We investigated the relationship between food security status and dyslipidemia among low-income adolescents. Methods We analyzed data from adolescents aged 12 to 18 years (N = 1,072) from households with incomes at or below 200% of the federal poverty level from the National Health and Nutrition Examination Survey (NHANES) 2003–2010. We used logistic regression to examine the relationship between household food security status and the odds of having abnormalities with fasting total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), serum triglycerides (TGs), high-density lipoprotein cholesterol (HDL-C), TG/HDL-C ratio, and apolipoprotein B (Apo B). Models included age, sex, race/ethnicity, smoking status, partnered status in the household, and maternal education, with additional adjustment for adiposity. Results Household food security status was not associated with elevated TC or LDL-C. Adolescents with marginal food security were more likely than food-secure peers to have elevated TGs (odds ratio [OR] = 1.86; 95% confidence interval [CI], 1.14–3.05), TG/HDL-C ratio (OR = 1.74; 95% CI, 1.11–2.82), and Apo B (OR = 1.98; 95% CI, 1.17–3.36). Female adolescents with marginal food security had greater odds than male adolescents of having low HDL-C (OR = 2.69; 95% CI, 1.14–6.37). No elevated odds of dyslipidemia were found for adolescents with low or very low food security. Adjustment for adiposity did not attenuate estimates. Conclusion In this nationally representative sample, low-income adolescents living in households with marginal food security had increased odds of having a pattern consistent with atherogenic dyslipidemia, which represents a cardiometabolic burden above their risk from adiposity

  17. Information security of children and adolescents in understanding parents and teachers

    Directory of Open Access Journals (Sweden)

    Bovina I.B.

    2015-11-01

    Full Text Available The article presents the first part of the work devoted to the study of ordinary representations of parents and teachers about information security of children and adolescents. It is about addressing the problem of information security of children and adolescents, discuss the effects of observing violence in the mass media on the subsequent behaviour of viewers, refers to directing television roles on the example of transfer schemes by S. Milgram in the context of television game (experiment J. L. Beauvois with colleagues. This paper examines the impact on users has the Internet, discusses the main directions of action in relation to ensuring information security of children and adolescents, focusing on psychological aspects of the concept of information security of children, demonstrates the importance of studying "naive theories" that govern the actions aimed at ensuring information security of children. The authors explain the prospect of studying problems of information security of children in the framework of the theory of social representations.

  18. The impact of attachment security and emotion dysregulation on anxiety in children and adolescents

    DEFF Research Database (Denmark)

    Bender, Patrick K.; Sømhovd, Mikael; Pons, Francisco

    2015-01-01

    Theoretical views and empirical findings suggest interrelations among attachment security, emotion dysregulation and anxiety in childhood and adolescence. However, the associations among the three constructs have rarely been investigated in children, and no study has yet addressed...... to anxiety and that emotion dysregulation would help explain the association between attachment security and anxiety. Results showed that more securely attached youths reported less emotion dysregulation and that youths who had fewer emotion regulation difficulties experienced less anxiety. The association...... between attachment security and anxiety was mediated by emotion dysregulation. The model was confirmed for both children and adolescents. Findings are discussed with respect to theoretical implications, as well as future directions....

  19. Gratitude is associated with greater levels of protective factors and lower levels of risks in African American adolescents.

    Science.gov (United States)

    Ma, Mindy; Kibler, Jeffrey L; Sly, Kaye

    2013-10-01

    The literature suggests gratitude is associated with positive youth development. The current study examined the relationship between gratitude and protective/risk factors among African American youth. Adolescents (N = 389; 50.4% males) ages 12-14 completed measures of gratitude (moral affect and life-orientation), protective factors (e.g., academic and activity engagement, family relationship), and high-risk behaviors (e.g., sexual attitudes and behaviors, drug/alcohol use). Results indicated greater moral affect gratitude was the only variable significantly associated with greater academic interest, better academic performance, and more extra-curricular activity engagement. Greater moral affect and life-orientation gratitude both significantly correlated with positive family relationship. Greater life-orientation gratitude was the only variable significantly associated with abstinence from sexual intimacy, sexual intercourse, likelihood of engaging in sex during primary school, and abstinence from drug/alcohol use. The findings suggest that moral affect gratitude may enhance protective factors while life-orientation gratitude may buffer against high-risk behaviors among African American youth. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  20. During early and mid-adolescence, greater mental toughness is related to increased sleep quality and quality of life.

    Science.gov (United States)

    Brand, Serge; Kalak, Nadeem; Gerber, Markus; Clough, Peter J; Lemola, Sakari; Pühse, Uwe; Holsboer-Trachsler, Edith

    2016-06-01

    The aim of this study was to explore the association between mental toughness, subjective sleep, physical activity, and quality of life during early and mid-adolescence. A total of 1475 participants (mean age = 13.4 years; range: 11-16 years) took part in the study. They completed questionnaires related to mental toughness, physical activity, subjective sleep, and quality of life. Greater mental toughness was related to more favorable quality of life and increased subjective sleep. Mental toughness was not related to physical activity. Increased mental toughness, favorable quality of life, and sleep are related during early and mid-adolescence. Against our expectations, mental toughness was not related to physical activity. © The Author(s) 2014.

  1. Effects of the Interparental Relationship on Adolescents' Emotional Security and Adjustment: The Important Role of Fathers

    Science.gov (United States)

    Suh, Go Woon; Fabricius, William V.; Stevenson, Matthew M.; Parke, Ross D.; Cookston, Jeffrey T.; Braver, Sanford L.; Saenz, Delia S.

    2016-01-01

    We examined the mediational roles of multiple types of adolescents' emotional security in relations between multiple aspects of the interparental relationship and adolescents' mental health from ages 13 to 16 (N = 392). General marital quality, nonviolent parent conflict, and physical intimate partner violence independently predicted mental…

  2. The Impact of Attachment Security and Emotion Dysregulation on Anxiety in Children and Adolescents

    Science.gov (United States)

    Bender, Patrick K.; Sømhovd, Mikael; Pons, Francisco; Reinholdt-Dunne, Marie L.; Esbjørn, Barbara H.

    2015-01-01

    Theoretical views and empirical findings suggest interrelations among attachment security, emotion dysregulation and anxiety in childhood and adolescence. However, the associations among the three constructs have rarely been investigated in children, and no study has yet addressed these associations in adolescence. The aim of the present study was…

  3. Social information-processing and coping in adolescent females diagnosed with an eating disorder: toward a greater understanding of control.

    Science.gov (United States)

    McFillin, Roger K; Cahn, Stacey C; Burks, Virginia Salzer; Levine, Martha Peaslee; Loney, Susan Lane; Levine, Richard L

    2012-01-01

    The objective of this study was to examine differences in social information-processing and coping strategies between adolescent females in treatment for an eating disorder and asymptomatic peers. Adolescent females in treatment for an eating disorder (n = 50) were compared to asymptomatic control participants (n = 59) on a measure of social information-processing. Participants were presented with 4 hypothetical, ambiguous social dilemmas in which the intent of a peer provocateur was unclear. Questions followed each dilemma assessing intent attributions, the participant's emotional reaction, the intensity of the emotion, and coping strategies. The participants in treatment for an eating disorder were significantly more likely to perceive hostile intent from a peer provocateur, reported a greater intensity of negative emotions, and identified a significantly greater number of avoidant coping strategies. Specifically, the eating disorder group identified significantly more intrapunitive avoidant coping strategies that reflect maladaptive and self-destructive means of coping with distressing events. Results indicate social cognitive processing biases and maladaptive coping strategies may be instrumental in perceived loss of control and influence the development/maintenance of eating disorders.

  4. Exploitation, Violence, and Suicide Risk Among Child and Adolescent Survivors of Human Trafficking in the Greater Mekong Subregion.

    Science.gov (United States)

    Kiss, Ligia; Yun, Katherine; Pocock, Nicola; Zimmerman, Cathy

    2015-09-01

    Human trafficking and exploitation of children have profound health consequences. To our knowledge, this study represents the largest survey on the health of child and adolescent survivors of human trafficking. To describe experiences of abuse and exploitation, mental health outcomes, and suicidal behavior among children and adolescents in posttrafficking services. We also examine how exposures to violence, exploitation, and abuse affect the mental health and suicidal behavior of trafficked children. A survey was conducted with 387 children and adolescents aged 10 to 17 years in posttrafficking services in Cambodia, Thailand, or Vietnam, which along with Laos, Myanmar, and Yunnan Province, China, compose the Greater Mekong Subregion. Participants were interviewed within 2 weeks of entering services from October 2011 through May 2013. Depression, posttraumatic stress disorder, anxiety, suicidal ideation, self-injury, and suicide attempts. Among the 387 children and adolescent study participants, most (82%) were female. Twelve percent had tried to harm or kill themselves in the month before the interview. Fifty-six percent screened positive for depression, 33% for an anxiety disorder, and 26% for posttraumatic stress disorder. Abuse at home was reported by 20%. Physical violence while trafficked was reported by 41% of boys and 19% of girls. Twenty-three percent of girls and 1 boy reported sexual violence. Mental health symptoms were strongly associated with recent self-harm and suicide attempts. Severe physical violence was associated with depression (adjusted odds ratio [AOR], 3.55; 95% CI, 1.64-7.71), anxiety (AOR, 2.13; 95% CI, 1.12-4.05), and suicidal ideation (AOR, 3.68; 95% CI, 1.77-7.67). Sexual violence while trafficked was associated with depression (AOR, 2.27; 95% CI, 1.22-4.23) and suicidal ideation (AOR, 3.43; 95% CI, 1.80-6.54). Children and adolescents in posttrafficking care showed high symptom levels of depression, anxiety, and posttraumatic stress

  5. Security of Supply: A Pan-European Approach - The Opportunities and Requirements of Greater Cooperation Across European Electricity Markets

    International Nuclear Information System (INIS)

    Ulreich, S.

    2015-01-01

    In December 2014, Prognos AG (Berlin/Basel) was commissioned by the Weltenergierat - Deutschland e.V to prepare a study on the potential of greater cooperation across European electricity markets. The focus of the analysis was to address the extent to which closer cooperation on ensuring generation adequacy can lead to cost reductions. Fifteen countries were analysed: seven members of the Pentalateral Energy Forum (PLEF, DE, BE, NL, LU, FR, AT and CH) and eight additional bordering countries (PL, IT, UK, ES, DK, CZ, PT and IE). Today, ensuring generation adequacy takes place at a national level and international effects are not taken into account. However, if cross-border effects are considered adequacy considerations at a national level can be relieved, e.g.: load peaks in Europe do not occur simultaneously and the feedin from renewable energy takes place at different times. Potential savings arise, as less capacity needs to be secured by conventional power plants. An indicator for this in the present study is the so-called residual load. The study is based on analyses of all existing data relating to hourly load and feed-in from renewable energy for the period from 2009 to 2014. In addition, two scenarios (based on Visions V1 and V3 of ENTSO-E's System Outlook and Adequacy Forecast) and numerous sensitivities for 2030 were generated. As the variability of the results is highly dependent on weather conditions, 48 simulations of wind power (sensitivities) established a broad corridor of results. For this reason, ranges are used in the presentation of results. The approach makes this study the most comprehensive analysis to date of the potential of closer cooperation with respect to ensuring generation adequacy. With the assumption of no grid congestion, the study reaches the following results: 1) Reduction of residual load: In contrast to a national assessment scheme, under a collective assessment scheme the residual load will reduce by 2 to 15 gigawatts (most

  6. School Security Measures and Longitudinal Trends in Adolescents' Experiences of Victimization.

    Science.gov (United States)

    Fisher, Benjamin W; Mowen, Thomas J; Boman, John H

    2018-06-01

    Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.

  7. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    National Research Council Canada - National Science Library

    Sandoval, Thomas

    2002-01-01

    ...) and its impact on cooperative security in the Western Hemisphere. Similar to the l990s, when the U.S. government debated the pros and cons of the NAFTA, the United States now faces a debate over passage and implementation of the FTAA...

  8. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    Science.gov (United States)

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV.

  9. Information security of children and adolescents in the modern world: psychological aspects of the problem

    Directory of Open Access Journals (Sweden)

    Budykin S.V.

    2017-04-01

    Full Text Available The authors focus on identifying the psychological aspects of the problem of information security of children and adolescents in the modern world. It is noted that new technologies are penetrating deeper into our lives, become cultural means of socialization and human development, contribute to the formation of new social practices in everyday life, require a certain style of life. Draws attention to the fact that the impact of these technologies varies in age groups, the most vulnerable are children and adolescents. After Western researchers of problems of information security of children and adolescents, identifies the category of risk associated with Internet communication: 1 risk associated with the content of the materials provided on the Internet; 2 the risk due to contacts with others; 3 the risk arising in connection with the illegal downloading of materials. 4 risks resulting from the use of personal data, children and adolescents often provide personal information. Demonstrates the necessity of analyzing how users of new technologies to diagnose risk associated with the use of technology such as the Internet, and what behavioral strategies they adapt. Stresses the importance and the need to examine how the immediate environment of children and adolescents interpreterpath information security and suggests how to counter the threat, coupled with the use of the Internet.

  10. Knowledge of human papillomavirus infection and its prevention among adolescents and parents in the greater Milan area, Northern Italy

    Directory of Open Access Journals (Sweden)

    Consolo Silvia

    2010-06-01

    Full Text Available Abstract Background In order to be widely accepted by users, the implementation of a new health intervention requires them to be adequately informed about its clinical importance, benefits and risks. The aim of this study was to provide data on the knowledge of Italian adolescents and parents concerning human papillomavirus (HPV infection and its prevention in order to allow the development of adequate training programmes. Methods Between 2 May and 15 June 2008, we made a cross-sectional survey of 863 high school students and 2,331 parents of middle and high school students using two anonymously completed questionnaires covering the knowledge of HPV infection and related diseases, and attitudes to vaccinations. The approached schools were a convenience sample of the schools of the greater Milan area, Northern Italy. Results More mothers than fathers were aware that HPV infection could concern their children (58% vs 53%; p = 0.004 and were favourable towards vaccinating their children against HPV (68% vs 65%; p = 0.03; among the students, more females than males were aware that HPV infection could concern themselves (45% vs 26%; p vs 40%; p Conclusions Both students and parents seem to underestimate the likelihood of HPV infection, and this is associated with a lower propensity for vaccination. This is an important indication for future training programmes concerning HPV prevention designed to increase the acceptance of HPV vaccine in families.

  11. Trivariate Modeling of Interparental Conflict and Adolescent Emotional Security: An Examination of Mother-Father-Child Dynamics.

    Science.gov (United States)

    Cheung, Rebecca Y M; Cummings, E Mark; Zhang, Zhiyong; Davies, Patrick T

    2016-11-01

    Recognizing the significance of interacting family subsystems, the present study addresses how interparental conflict is linked to adolescent emotional security as a function of parental gender. A total of 272 families with a child at 12.60 years of age (133 boys, 139 girls) were invited to participate each year for three consecutive years. A multi-informant method was used, along with trivariate models to test the associations among mothers, fathers, and their adolescent children's behaviors. The findings from separate models of destructive and constructive interparental conflict revealed intricate linkages among family members. In the model of destructive interparental conflict, mothers and fathers predicted each other's conflict behaviors over time. Moreover, adolescents' exposure to negativity expressed by either parent dampened their emotional security. Consistent with child effects models, adolescent emotional insecurity predicted fathers' destructive conflict behaviors. As for the model of constructive interparental conflict, fathers predicted mothers' conflict behaviors over time. Adolescents' exposure to fathers' constructive conflict behaviors also enhanced their sense of emotional security. Consistent with child effects models, adolescent emotional security predicted mothers' and fathers' constructive conflict behaviors. These findings extended the family and the adolescent literature by indicating that family processes are multiidirectional, involving multiple dyads in the study of parents' and adolescents' functioning. Contributions of these findings to the understanding of interparental conflict and emotional security in adolescence are discussed.

  12. Family and Individual Factors Associated with Substance Involvement and PTS Symptoms among Adolescents in Greater New Orleans after Hurricane Katrina

    Science.gov (United States)

    Rowe, Cynthia L.; La Greca, Annette M.; Alexandersson, Anders

    2010-01-01

    Objective: This study examined the influence of hurricane impact as well as family and individual risk factors on posttraumatic stress (PTS) symptoms and substance involvement among clinically referred adolescents affected by Hurricane Katrina. Method: A total of 80 adolescents (87% male; 13-17 years old; mean age = 15.6 years; 38% minorities) and…

  13. Multiple Facets of Self-Control in Arab Adolescents: Parallel Pathways to Greater Happiness and Less Physical Aggression

    Science.gov (United States)

    Gavriel-Fried, Belle; Ronen, Tammie; Agbaria, Qutaiba; Orkibi, Hod; Hamama, Liat

    2018-01-01

    Adolescence is a period of dramatic change that necessitates using skills and strengths to reduce physical aggression and increase happiness. This study examined the multiple facets of self-control skills in achieving both goals simultaneously, in a sample of 248 Arab adolescents in Israel. We conceptualized and tested a new multi-mediator model…

  14. Eveningness and Later Sleep Timing Are Associated with Greater Risk for Alcohol and Marijuana Use in Adolescence: Initial Findings from the National Consortium on Alcohol and Neurodevelopment in Adolescence Study.

    Science.gov (United States)

    Hasler, Brant P; Franzen, Peter L; de Zambotti, Massimiliano; Prouty, Devin; Brown, Sandra A; Tapert, Susan F; Pfefferbaum, Adolf; Pohl, Kilian M; Sullivan, Edith V; De Bellis, Michael D; Nagel, Bonnie J; Baker, Fiona C; Colrain, Ian M; Clark, Duncan B

    2017-06-01

    Abundant cross-sectional evidence links eveningness (a preference for later sleep-wake timing) and increased alcohol and drug use among adolescents and young adults. However, longitudinal studies are needed to examine whether eveningness is a risk factor for subsequent alcohol and drug use, particularly during adolescence, which is marked by parallel peaks in eveningness and risk for the onset of alcohol use disorders. This study examined whether eveningness and other sleep characteristics were associated with concurrent or subsequent substance involvement in a longitudinal study of adolescents. Participants were 729 adolescents (368 females; age 12 to 21 years) in the National Consortium on Alcohol and Neurodevelopment in Adolescence study. Associations between the sleep variables (circadian preference, sleep quality, daytime sleepiness, sleep timing, and sleep duration) and 3 categorical substance variables (at-risk alcohol use, alcohol bingeing, and past-year marijuana use [y/n]) were examined using ordinal and logistic regression with baseline age, sex, race, ethnicity, socioeconomic status, and psychiatric problems as covariates. At baseline, greater eveningness was associated with greater at-risk alcohol use, greater bingeing, and past-year use of marijuana. Later weekday and weekend bedtimes, but not weekday or weekend sleep duration, showed similar associations across the 3 substance outcomes at baseline. Greater baseline eveningness was also prospectively associated with greater bingeing and past-year use of marijuana at the 1-year follow-up, after covarying for baseline bingeing and marijuana use. Later baseline weekday and weekend bedtimes, and shorter baseline weekday sleep duration, were similarly associated with greater bingeing and past-year use of marijuana at the 1-year follow-up after covarying for baseline values. Findings suggest that eveningness and sleep timing may be under recognized risk factors and future areas of intervention for

  15. Face-to-face sharing with strangers and altruistic punishment of acquaintances for strangers: Young adolescents exhibit greater altruism than adults

    Directory of Open Access Journals (Sweden)

    Jian Hao

    2016-10-01

    Full Text Available Young adolescents are generally considered to be self-absorbed. Studies indicate that they lack relevant general cognitive abilities, such as impulse control, that mature in early adulthood. However, their idealism may cause them to be more intolerant of unfair treatment to others and thus result in their engaging in more altruistic behavior. The present study aimed to clarify whether young adolescents are more altruistic than adults and thus indicate whether altruistic competence is domain-specific. One hundred twenty-two young adolescents and adults participated in a face-to-face, two-round, third-party punishment experiment. In each interaction group, a participant served as an allocator who could share money units with a stranger; another participant who knew the allocator could punish the acquaintance for the stranger. Participants reported their emotions after the first round, and at the end of the experiment, the participants justified their behavior in each round. The results indicated that the young adolescents both shared more and punished more than did the adults. Sharing was associated with a reference to fairness in the justifications, but altruistic punishment was associated with subsequent positive emotion. In sum, greater altruism in young adolescents compared to adults with mature cognitive abilities provides evidence of domain-specificity of altruistic competence. Moreover, sharing and altruistic punishment is related to specific cognitive and emotional mechanisms respectively.

  16. Face-to-Face Sharing with Strangers and Altruistic Punishment of Acquaintances for Strangers: Young Adolescents Exhibit Greater Altruism than Adults

    Science.gov (United States)

    Hao, Jian; Yang, Yue; Wang, Zhiwen

    2016-01-01

    Young adolescents are generally considered to be self-absorbed. Studies indicate that they lack relevant general cognitive abilities, such as impulse control, that mature in early adulthood. However, their idealism may cause them to be more intolerant of unfair treatment to others and thus result in their engaging in more altruistic behavior. The present study aimed to clarify whether young adolescents are more altruistic than adults and thus indicate whether altruistic competence is domain-specific. One hundred 22 young adolescents and adults participated in a face-to-face, two-round, third-party punishment experiment. In each interaction group, a participant served as an allocator who could share money units with a stranger; another participant who knew the allocator could punish the acquaintance for the stranger. Participants reported their emotions after the first round, and at the end of the experiment, the participants justified their behavior in each round. The results indicated that the young adolescents both shared more and punished more than did the adults. Sharing was associated with a reference to fairness in the justifications, but altruistic punishment was associated with subsequent positive emotion. In sum, greater altruism in young adolescents compared to adults with mature cognitive abilities provides evidence of domain-specificity of altruistic competence. Moreover, sharing and altruistic punishment are related to specific cognitive and emotional mechanisms, respectively. PMID:27752246

  17. Similar Mediterranean diet adherence but greater central adiposity is observed among Greek diaspora adolescents living in Istanbul, compared to Athens.

    Science.gov (United States)

    Grammatikopoulou, Maria G; Maraki, Maria I; Giannopoulou, Despoina; Poulimeneas, Dimitrios; Sidossis, Labros S; Tsigga, Maria

    2018-02-01

    The aim of this case-control study was to compare Mediterranean diet (MD) adherence and anthropometry between Greek diaspora adolescents living in Istanbul and Greek adolescents, inhabitants of Athens. A total of 206 adolescents (103 from each site), aged 10.0-19.0 years old, all of Greek origin, were recruited from schools in Athens and minority schools in Istanbul, for the present case-control study. Participants at each site were age and sex-matched. Anthropometric measurements were performed, and diet adherence was assessed with the KIDMED score. Breakfast skipping, decreased dairy and increased commercially baked good/pastries consumption for breakfast, fast-food intake and consumption of several sweets each day was more prevalent in Istanbul, but, on the other hand, students from Athens reported eating fewer fruit, vegetables and nuts. The adoption of unhealthy eating habits in each site was counterbalanced by a more 'healthy' dietary element, resulting in an overall similar MD adherence between both sites. Additionally, although weight status was indifferent between the two cities, higher rates of abdominal obesity were recorded in Istanbul, when the weight-to-height ratio was used for diagnosis. Differences in several domains of the KIDMED score were recorded among cities, possibly as results of food availability and prices. However, MD adherence and weight status appeared similar, indicating that the dietary transition and acculturation experienced by the remnants is actually very slow and minimal during the 93 years since population exchange.

  18. Regional energy resource development and energy security under CO{sub 2} emission constraint in the greater Mekong sub-region countries (GMS)

    Energy Technology Data Exchange (ETDEWEB)

    Watcharejyothin, Mayurachat; Shrestha, Ram M. [School of Environment, Resources and Development, Asian Institute of Technology (Thailand)

    2009-11-15

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO{sub 2} emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO{sub 2} emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO{sub 2} emission reduction strategy would be less costly than that under the individual emission targets set for each country. (author)

  19. Regional energy resource development and energy security under CO2 emission constraint in the greater Mekong sub-region countries (GMS)

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO 2 emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO 2 emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO 2 emission reduction strategy would be less costly than that under the individual emission targets set for each country.

  20. From which level of competition in clubs are adolescents at greater risk of injury compared with outside-of-clubs athletes? A school-based study.

    Science.gov (United States)

    Luiggi, Maxime; Rindler, Victoria; Griffet, Jean

    2018-02-01

    Sport practice is a key factor in a person's physical and mental health but, for adolescent athletes, some injuries lead to health problems in the long term. The literature provides multiple factors for understanding injury but does not give information about injury risk related to each level of play in a large sample of multisport athletes. This study investigates this relationship in 14- to 19-year-old adolescents. The survey on adolescents and health was conducted in classrooms of France, from February to March 2015. Only sports players were included in the analyses (n = 986). The levels of play were divided into five categories: outside of a club/no competition, club player/no competition, club player/local level, club player/state level and club player/national and higher level. A three-step binary logistic regression analysis with age, sex, type of sport, weekly hours of exposure, and level of play was used. During the past year, 48.1% of the adolescents were injured. Age and sex were not risk factors. The injury risk associated with the increases in level of play is higher than those related to the hours of exposure per week or the type of sport. In clubs, adolescents who do not compete or play at a local level showed no evidence of greater injury risk whereas state-level and national- and higher-level athletes were at greater risk than outside-of-club players (OR = 2.18, 95%CI = 1.13-3.94 and OR = 3.89, 95%CI = 2.07-7.31, respectively). Adolescents who play sports in clubs are clearly more exposed to injury than those who play outside of a club, mainly from state level. Age and sex are not related to injury. Future epidemiological studies should control adolescents' level of play. Special attention should be accorded to the injury risk of athletes playing at these levels of competition.

  1. Prospective relations between family conflict and adolescent maladjustment: security in the family system as a mediating process.

    Science.gov (United States)

    Cummings, E Mark; Koss, Kalsea J; Davies, Patrick T

    2015-04-01

    Conflict in specific family systems (e.g., interparental, parent-child) has been implicated in the development of a host of adjustment problems in adolescence, but little is known about the impact of family conflict involving multiple family systems. Furthermore, questions remain about the effects of family conflict on symptoms of specific disorders and adjustment problems and the processes mediating these effects. The present study prospectively examines the impact of family conflict and emotional security about the family system on adolescent symptoms of specific disorders and adjustment problems, including the development of symptoms of anxiety, depression, conduct problems, and peer problems. Security in the family system was examined as a mediator of these relations. Participants included 295 mother-father-adolescent families (149 girls) participating across three annual time points (grades 7-9). Including auto-regressive controls for initial levels of emotional insecurity and multiple adjustment problems (T1), higher-order emotional insecurity about the family system (T2) mediated relations between T1 family conflict and T3 peer problems, anxiety, and depressive symptoms. Further analyses supported specific patterns of emotional security/insecurity (i.e., security, disengagement, preoccupation) as mediators between family conflict and specific domains of adolescent adjustment. Family conflict was thus found to prospectively predict the development of symptoms of multiple specific adjustment problems, including symptoms of depression, anxiety, conduct problems, and peer problems, by elevating in in adolescent's emotional insecurity about the family system. The clinical implications of these findings are considered.

  2. Children and adolescents facing a continuous security threat: Aggressive behavior and post-traumatic stress symptoms.

    Science.gov (United States)

    Nuttman-Shwartz, Orit

    2017-07-01

    There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of

  3. Social representations and information security of children and adolescents: the point of view of teachers (Part 1

    Directory of Open Access Journals (Sweden)

    Bovina I.B.

    2017-04-01

    Full Text Available The focus of attention of the authors is the consideration of information security of children and adolescents as the object of social representations. Discusses the need for the theory of social representations to develop prophylactic and preventive programs in the field of information security of children and adolescents, in particular, says that the effectiveness of prevention and preventive programs is determined by how this information is understood by the target group, through what filters it passes. Briefly outlines the main provisions of the theory of social representations, discusses the functions of social representations, the mechanism of action ideas. Analyzed in a few studies, the focus of which was the presentation on new technologies, particularly mobile phones and the Internet. Presents the results of a series of studies devoted to the study of information security of children and adolescents, including the results of the first part of a research project dedicated to the analysis of how parents and teachers understand information security and what strategies to protect children and adolescents from dangerous information they are ready to use.

  4. Information Security of Children and Adolescents According to Parents and Teachers (Part 2: The Results of an Empirical Study

    Directory of Open Access Journals (Sweden)

    Budykin S.V.

    2016-03-01

    Full Text Available In this paper we present a second part of the study on information security of children and adolescents according to parents and teachers. This part of the study focuses at empirical research results aimed in studying the so-called "naive theories" about information security. 136 people (aged 21 to 62 years attended the study. We based on the following hypotheses : 1 the group of parents and teachers understand similarly the issue of information threat for children and adolescents, yet they have different understandings of the dangerous effects of information on children and adolescents: parents underestimate the seriousness of the effects compared with teachers; 2 according to parents and teachers, the formers are primarily responsible for information security of children; while teachers expect parents to monitor, prohibit, restrict the access to information for children and adolescents. Parents, in turn, expect teachers to train children and teenagers to observe the safety procedures, as well as use Internet safely. Our assumptions are confirmed partly, and study results are discussed in terms of the theory of social representations.

  5. [The relationship between a sense of security and psychological problems in adolescents living in boarding schools and youth-welfare institutions].

    Science.gov (United States)

    Seidler, Corinna; Rau, Thea; Allroggen, Marc

    2018-05-01

    The willingness to participate and a sense of security are important aspects to be fostered in the institutional care of adolescents. Although these aspects are increasingly being examined from the perspective of the affected adolescents, it has yet to be considered whether psychological problems can be attributed to their experiences with the above-mentioned aspects. A total of 216 adolescents aged 14 to 18 years answered an online questionnaire the sense of security in their institution and their perception of the institution. Their willingness to participate was also examined. Psychological symptoms were assessed with the Strengths and Difficulties Questionnaire Self-Report (SDQ-S). There is a significant correlation between sense of security and the overall SDQ score, with prosocial behavior, and with the positive perception of the institution. In addition, sense of security had a significant influence on the SDQ factors, the positive perception of the institution, and the items on the willingness to participate of the adolescents. The subsequent t-tests also showed significant results. Among other things, it was shown that the factor problems of adolescents is related to sense of security. The results provide an initial indication that there is a link between sense of security and psychological symptoms as well as willingness to participate and perception of the institution. Especially problems of adolescents in dealing with peers must be taken into account.in the development of protective concepts to increase the sense of security and their willingness to participate.

  6. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study: A study of protocols in Greater London

    Directory of Open Access Journals (Sweden)

    Ford Tamsin

    2008-06-01

    Full Text Available Abstract Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS to Adult Mental Health Services (AMHS in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005 of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65% responded to the survey. Teams varied in type (generic/targeted/in-patient, catchment area (locality-based, wider or national and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37 was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33. In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in

  7. Longitudinal relation between general well-being and self-esteem : Testing differences for adolescents admitted to secure residential care and after discharge

    NARCIS (Netherlands)

    Barendregt, C.S.; Laan, A.J.; Bongers, I.L.; van Nieuwenhuizen, Ch.

    2016-01-01

    This study investigated the longitudinal relation between general well-being and self-esteem of male adolescents with severe psychiatric disorders. Moreover, the transition out of secure residential care was studied. Adolescents (N = 172) were assessed three times with 6 months between each

  8. Food security and metabolic syndrome in U.S. adults and adolescents: findings from the National Health and Nutrition Examination Survey, 1999-2006.

    Science.gov (United States)

    Parker, Emily D; Widome, Rachel; Nettleton, Jennifer A; Pereira, Mark A

    2010-05-01

    We sought to examine the association of food security and metabolic syndrome in a representative sample of U.S. adults and adolescents. We hypothesized that compared with those in food-secure households, adolescents and adults living in food-insecure households would have increased odds of (MetS). Data from the National Health and Nutrition Examination Surveys from 1999 to 2006 were combined and analyzed cross-sectionally. Logistic regression was used to compute odds ratios and 95% confidence intervals (95% CI) in the association of household food security (fully food secure, marginal, low, and very low food security) and MetS. Compared with those who were food secure, adults in households with marginal food security had 1.80-fold increased odds of MetS (95% CI, 1.30-2.49), and those with very low food security had a 1.65-fold increased odds of MetS (95% CI 1.12-2.42). There was no association with low food security. The association of marginal household food security and MetS was not significant in adolescents. In adults and adolescents, very low was food security not associated with increased odds of MetS compared with those who were food secure. Members of households with marginal and very low food security are at increased risk of MetS. A mechanism may be that foods that are inexpensive and easily accessible tend to be energy dense and nutrient poor. 2010 Elsevier Inc. All rights reserved.

  9. Relational Security Moderates the Effect of Serotonin Transporter Gene Polymorphism (5-HTTLPR) on Stress Generation and Depression among Adolescents

    Science.gov (United States)

    Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake M.

    2013-01-01

    Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs…

  10. Infant attachment security and early childhood behavioral inhibition interact to predict adolescent social anxiety symptoms.

    Science.gov (United States)

    Lewis-Morrarty, Erin; Degnan, Kathryn A; Chronis-Tuscano, Andrea; Pine, Daniel S; Henderson, Heather A; Fox, Nathan A

    2015-01-01

    Insecure attachment and behavioral inhibition (BI) increase risk for internalizing problems, but few longitudinal studies have examined their interaction in predicting adolescent anxiety. This study included 165 adolescents (ages 14-17 years) selected based on their reactivity to novelty at 4 months. Infant attachment was assessed with the Strange Situation. Multimethod BI assessments were conducted across childhood. Adolescents and their parents independently reported on anxiety. The interaction of attachment and BI significantly predicted adolescent anxiety symptoms, such that BI and anxiety were only associated among adolescents with histories of insecure attachment. Exploratory analyses revealed that this effect was driven by insecure-resistant attachment and that the association between BI and social anxiety was significant only for insecure males. Clinical implications are discussed. © 2014 The Authors. Child Development © 2014 Society for Research in Child Development, Inc.

  11. F227. PSYCHOLOGICAL TRAUMA OCCURRING DURING ADOLESCENCE IS ASSOCIATED WITH AN INCREASED RISK OF GREATER WAIST CIRCUMFERENCE IN EARLY PSYCHOSIS PATIENTS INDEPENDENTLY OF MEDICATION

    Science.gov (United States)

    Alameda, Luis; Levier, Axel; Golay, Philippe; Gholam-Rezaee, Mehdi; Vandenberghe, Frederik; Delacretaz, Aurélie; Glatard, Anaïs; Dubath, Céline; Do, Kim Q; Eap, Chin B; Conus, Philippe

    2018-01-01

    present in 32% of the sample. No differences between groups were found at baseline in terms of BMI or WC. Late-Trauma patients, when compared to Non-Trauma patients showed greater WCs during the follow-up (p=0.012). No differences between Early or Late-Trauma patients and Non-Trauma patients were found in any of the other outcome measures during the follow up. Baseline BMI and treatment duration were significantly associated with the level of BMI and WC during the follow up. None of the other potential confounding factors were significantly associated with the outcome measures during the follow up. Discussion Exposition to trauma during adolescence in EP patients is associated with a higher risk of greater WC during the early phase of the disease, independently of the medication intake, depression and other confounding factors. Specific preventive measures should be addressed in these patients in order to reduce the risk of obesity. Depending on the timing of traumatic exposure, different developmental mechanisms may underlie this differential possible impact on WC. Further studies on interactions between central consequences of traumatism and metabolic syndrome are warranted.

  12. Emotional and Adrenocortical Regulation in Early Adolescence: Prediction by Attachment Security and Disorganization in Infancy

    Science.gov (United States)

    Spangler, Gottfried; Zimmermann, Peter

    2014-01-01

    The aim of the present study was to examine differences in emotion expression and emotion regulation in emotion-eliciting situations in early adolescence from a bio-psycho-social perspective, specifically investigating the influence of early mother-infant attachment and attachment disorganization on behavioural and adrenocortical responses. The…

  13. Adolescent Online Cyberbullying in Greece: The Impact of Parental Online Security Practices, Bonding, and Online Impulsiveness

    Science.gov (United States)

    Floros, Georgios D.; Siomos, Konstantinos E.; Fisoun, Virginia; Dafouli, Evaggelia; Geroukalis, Dimitrios

    2013-01-01

    Background: The introduction of new technological media worldwide has had a number of unfortunate side effects for some adolescents, including cases of bullying others through the new media (cyberbullying) and over-involvement to the point of addiction. We examine the epidemiology of cyberbullying in a Greek setting, compare it with earlier data,…

  14. Greater effects of high- compared with moderate-intensity interval training on cardio-metabolic variables, blood leptin concentration and ratings of perceived exertion in obese adolescent females

    OpenAIRE

    Racil, G; Coquart, JB; Elmontassar, W; Haddad, M; Goebel, R; Chaouachi, A; Amri, M; Chamari, K

    2016-01-01

    This study examined the effects of high- vs. moderate-intensity interval training on cardiovascular fitness, leptin levels and ratings of perceived exertion (RPE) in obese female adolescents. Forty-seven participants were randomly assigned to one of three groups receiving either a 1:1 ratio of 15 s of effort comprising moderate-intensity interval training (MIIT at 80% maximal aerobic speed: MAS) or high-intensity interval training (HIIT at 100% MAS), with matched 15 s recovery at 50% MAS, thr...

  15. Greater Prevalence of Proposed ICD-11 Alcohol and Cannabis Dependence Compared to ICD-10, DSM-IV, and DSM-5 in Treated Adolescents.

    Science.gov (United States)

    Chung, Tammy; Cornelius, Jack; Clark, Duncan; Martin, Christopher

    2017-09-01

    Proposed International Classification of Diseases, 11th edition (ICD-11), criteria for substance use disorder (SUD) radically simplify the algorithm used to diagnose substance dependence. Major differences in case identification across DSM and ICD impact determinations of treatment need and conceptualizations of substance dependence. This study compared the draft algorithm for ICD-11 SUD against DSM-IV, DSM-5, and ICD-10, for alcohol and cannabis. Adolescents (n = 339, ages 14 to 18) admitted to intensive outpatient addictions treatment completed, as part of a research study, a Structured Clinical Interview for DSM SUDs adapted for use with adolescents and which has been used to assess DSM and ICD SUD diagnoses. Analyses examined prevalence across classification systems, diagnostic concordance, and sources of diagnostic disagreement. Prevalence of any past-year proposed ICD-11 alcohol or cannabis use disorder was significantly lower compared to DSM-IV and DSM-5 (ps DSM-5, and ICD-10 (ps DSM-5 SUD diagnoses showed only moderate concordance. For both alcohol and cannabis, youth typically met criteria for an ICD-11 dependence diagnosis by reporting tolerance and much time spent using or recovering from the substance, rather than symptoms indicating impaired control over use. The proposed ICD-11 dependence algorithm appears to "overdiagnose" dependence on alcohol and cannabis relative to DSM-IV and ICD-10 dependence, and DSM-5 moderate/severe use disorder, generating potential "false-positive" cases of dependence. Among youth who met criteria for proposed ICD-11 dependence, few reported impaired control over substance use, highlighting ongoing issues in the conceptualization and diagnosis of SUD. Copyright © 2017 by the Research Society on Alcoholism.

  16. Prevalence of Thinness in Adolescent Girls in Low- and Middle-Income Countries and Associations With Wealth, Food Security, and Inequality.

    Science.gov (United States)

    Candler, Toby; Costa, Silvia; Heys, Michelle; Costello, Anthony; Viner, Russell M

    2017-04-01

    Adequate nutrition during adolescence is important for optimal physical and cognitive development and for pregnancy either during adolescence or later life. Thinness among adolescent girls in low- and middle-income countries has been little studied. We used body mass index data from 40 countries from the Global School Health Survey to estimate the prevalence of moderate and severe thinness in 12- to 18-year-olds using the World Health Organization 2007 growth reference. Self-report data on going to bed hungry were used as a proxy for household food insecurity. We used multilevel models to assess whether national wealth (gross domestic product), income inequality (Gini index), national gender inequality (Gender Inequality Index), and food security (Global Food Security Index) were associated with undernutrition. Prevalence rates of moderate and severe thinness across 61,603 girls from 40 countries were 6.30% (95% confidence interval [CI]: 5.71-6.95) and 1.34% (1.12-1.59), respectively, with higher rates in Asia. Combined moderate/severe thinness was more common among early (12-14 years) than later adolescents (15-18 years). Going to bed hungry sometimes was associated with increased risk of moderate/severe thinness (odds ratio [OR]: 1.102; 95% CI: 1.007-1.206). A significant inverse relationship was found between thinness and gross domestic product (OR: .94; 95% CI: .88-.99) and Global Food Security Index (OR: .96; 95% CI: .93-.99) but not Gini or Gender Inequality Index. Thinness remains prevalent in adolescent schoolgirls in low- and middle-income countries and poses a significant threat to their health and that of the next generation. Further research is needed to assess potential interventions for this group. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. Adolescents in secure residential care: the role of active and passive coping on general well-being and self-esteem.

    Science.gov (United States)

    Barendregt, Charlotte S; Van der Laan, André M; Bongers, Ilja L; Van Nieuwenhuizen, Chijs

    2015-07-01

    Coping, general well-being and self-esteem play an important role during the process of adaptation to turning points in life-course. This study aimed to investigate the effect of coping on both the development of general well-being and self-esteem of adolescents with severe psychiatric problems in secure residential care. In addition, risk and protective factors were taken into account. Adolescents between the age of 16 and 18 (N = 172) were followed for 1.5 years. General well-being and self-esteem were assessed with the Lancashire Quality of Life Profile and the Self-Perception Profile for Adolescents, respectively. In addition, the Utrecht Coping List for Adolescents and the Structured Assessment of Violence Risk in Youth were administered. Results showed that the longitudinal relation between general well-being and self-esteem is no longer significant after adding active and passive coping to the model. The use of active coping strategies was associated with a higher self-esteem. The use of passive coping strategies was associated with a lower self-esteem and also a lower perceived general well-being. Having multiple risks in the individual and/or social/contextual domain affected the developmental pattern of general well-being. During treatment of adolescents with severe psychiatric problems in secure residential care, attention should be paid for enhancing those capabilities and skills, like coping, which help adolescents to fulfill their needs and consequently enhance their well-being. Enhancing the well-being of adolescents might in the long run decrease the chance of reoffending and/or psychiatric relapse.

  18. Greater effects of high- compared with moderate-intensity interval training on cardio-metabolic variables, blood leptin concentration and ratings of perceived exertion in obese adolescent females.

    Science.gov (United States)

    Racil, G; Coquart, J B; Elmontassar, W; Haddad, M; Goebel, R; Chaouachi, A; Amri, M; Chamari, K

    2016-06-01

    This study examined the effects of high- vs. moderate-intensity interval training on cardiovascular fitness, leptin levels and ratings of perceived exertion (RPE) in obese female adolescents. Forty-seven participants were randomly assigned to one of three groups receiving either a 1:1 ratio of 15 s of effort comprising moderate-intensity interval training (MIIT at 80% maximal aerobic speed: MAS) or high-intensity interval training (HIIT at 100% MAS), with matched 15 s recovery at 50% MAS, thrice weekly, or a no-training control group. The HIIT and MIIT groups showed improved (p HIIT group showed decreased waist circumference (WC) (p = 0.017). The effect of exercise on maximal oxygen uptake (VO2max) was significant (p = 0.019, ES = 0.48 and p = 0.010, ES = 0.57, HIIT and MIIT, respectively). The decrease of rate-pressure product (RPP) (p HIIT and MIIT, respectively) followed the positive changes in resting heart rate and blood pressures. Blood glucose, insulin level and the homeostasis model assessment index for insulin decreased (p HIIT and MIIT, respectively. In the post-intervention period, blood leptin was strongly associated with %BF (p HIIT and MIIT groups, respectively, while RPE was strongly associated with BM (p HIIT group. The results suggest that high-intensity interval training may produce more positive effects on health determinants in comparison with the same training mode at a moderate intensity.

  19. Greater effects of high- compared with moderate-intensity interval training on cardio-metabolic variables, blood leptin concentration and ratings of perceived exertion in obese adolescent females

    Directory of Open Access Journals (Sweden)

    G Racil

    2016-04-01

    Full Text Available This study examined the effects of high- vs. moderate-intensity interval training on cardiovascular fitness, leptin levels and ratings of perceived exertion (RPE in obese female adolescents. Forty-seven participants were randomly assigned to one of three groups receiving either a 1:1 ratio of 15 s of effort comprising moderate-intensity interval training (MIIT at 80% maximal aerobic speed: MAS or high-intensity interval training (HIIT at 100% MAS, with matched 15 s recovery at 50% MAS, thrice weekly, or a no-training control group. The HIIT and MIIT groups showed improved (p˂0.05 body mass (BM, BMI Z-score, and percentage of body fat (%BF. Only the HIIT group showed decreased waist circumference (WC (p=0.017. The effect of exercise on maximal oxygen uptake (VO2max was significant (p=0.019, ES=0.48 and p=0.010, ES=0.57, HIIT and MIIT, respectively. The decrease of rate-pressure product (RPP (p<0.05, ES=0.53 and ES=0.46, HIIT and MIIT, respectively followed the positive changes in resting heart rate and blood pressures. Blood glucose, insulin level and the homeostasis model assessment index for insulin decreased (p<0.05 in both training groups. Significant decreases occurred in blood leptin (p=0.021, ES=0.67 and p=0.011, ES=0.73 and in RPE (p=0.001, ES=0.76 and p=0.017, ES=0.57 in HIIT and MIIT, respectively. In the post-intervention period, blood leptin was strongly associated with %BF (p<0.001 and VO2max (p<0.01 in the HIIT and MIIT groups, respectively, while RPE was strongly associated with BM (p<0.01 in the HIIT group. The results suggest that high-intensity interval training may produce more positive effects on health determinants in comparison with the same training mode at a moderate intensity.

  20. The experience of clinical supervision for nurses and healthcare assistants in a secure adolescent service: Affecting service improvement.

    Science.gov (United States)

    McCarron, R H; Eade, J; Delmage, E

    2018-04-01

    2013, HCAs and nurses in a secure adolescent service were surveyed about clinical supervision. Forty-nine HCAs and 20 nurses responded. In 2014, interventions to facilitate supervision were introduced. In 2016, the study was repeated. Forty HCAs and 30 nurses responded. Responses were analysed using a mixed methods approach. Results Significantly more HCAs found supervision to be a positive experience in 2016, and both nurses and HCAs reported significantly fewer challenges in accessing supervision. HCAs and nurses understood the value of clinical supervision. Discussion Significant improvements in the experience of clinical supervision were achieved following increased staff awareness, multidisciplinary and group supervision, and recording supervision rates. HCAs and nurses understood the consequences of inadequate supervision. Implications for practice Organizations could adopt the interventions to facilitate clinical supervision. Supervision should not be overlooked for HCAs. © 2017 John Wiley & Sons Ltd.

  1. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  2. Remaining or becoming secure: parental sensitive support predicts attachment continuity from infancy to adolescence in a longitudinal adoption study

    NARCIS (Netherlands)

    Beijersbergen, M.D.; Juffer, F.; Bakermans-Kranenburg, M.J.; IJzendoorn, M.H. van

    2012-01-01

    In a longitudinal study with 125 early adopted adolescents, we examined continuity of attachment from infancy to adolescence and the role of parental sensitive support in explaining continuity or discontinuity of attachment. Assessments of maternal sensitive support and infant attachment (Strange

  3. Greater retention in care among adolescents on antiretroviral treatment accessing "Teen Club" an adolescent-centred differentiated care model compared with standard of care: a nested case-control study at a tertiary referral hospital in Malawi.

    Science.gov (United States)

    MacKenzie, Rachel K; van Lettow, Monique; Gondwe, Chrissie; Nyirongo, James; Singano, Victor; Banda, Victor; Thaulo, Edith; Beyene, Teferi; Agarwal, Mansi; McKenney, Allyson; Hrapcak, Susan; Garone, Daniela; Sodhi, Sumeet K; Chan, Adrienne K

    2017-11-01

    There are numerous barriers to the care and support of adolescents living with HIV (ALHIV) that makes this population particularly vulnerable to attrition from care, poor adherence and virological failure. In 2010, a Teen Club was established in Zomba Central Hospital (ZCH), Malawi, a tertiary referral HIV clinic. Teen Club provides ALHIV on antiretroviral treatment (ART) with dedicated clinic time, sexual and reproductive health education, peer mentorship, ART refill and support for positive living and treatment adherence. The purpose of this study was to evaluate whether attending Teen Club improves retention in ART care. We conducted a nested case-control study with stratified selection, using programmatic data from 2004 to 2015. Cases (ALHIV not retained in care) and controls (ALHIV retained in care) were matched by ART initiation age group. Patient records were reviewed retrospectively and subjects were followed starting in March 2010, the month in which Teen Club was opened. Follow-up ended at the time patients were no longer considered retained in care or on 31 December 2015. Cases and controls were drawn from a study population of 617 ALHIV. Of those, 302 (48.9%) participated in at least two Teen Club sessions. From the study population, 135 (non-retained) cases and 405 (retained) controls were selected. In multivariable analyses, Teen Club exposure, age at the time of selection and year of ART initiation were independently associated with attrition. ALHIV with no Teen Club exposure were less likely to be retained than those with Teen Club exposure (adjusted odds ratio (aOR) 0.27; 95% CI 0.16, 0.45) when adjusted for sex, ART initiation age, current age, reason for ART initiation and year of ART initiation. ALHIV in the age group 15 to 19 were more likely to have attrition from care than ALHIV in the age group 10 to 14 years of age (aOR 2.14; 95% CI 1.12, 4.11). This study contributes to the limited evidence evaluating the effectiveness of service delivery

  4. Greater autonomy at work

    NARCIS (Netherlands)

    Houtman, I.L.D.

    2004-01-01

    In the past 10 years, workers in the Netherlands increasingly report more decision-making power in their work. This is important for an economy in recession and where workers face greater work demands. It makes work more interesting, creates a healthier work environment, and provides opportunities

  5. Parent-Adolescent Relationship Qualities, Internal Working Models, and Styles as Predictors of Adolescents’ Observed Interactions with Friends

    Science.gov (United States)

    Shomaker, Lauren B.; Furman, Wyndol

    2010-01-01

    This study examined how current parent-adolescent relationship qualities and adolescents’ representations of relationships with parents were related to friendship interactions in 200 adolescent-close friend dyads. Adolescents and friends were observed discussing problems during a series of structured tasks. Negative interactions with mothers were significantly related to adolescents’ greater conflict with friends, poorer focus on tasks, and poorer communication skills. Security of working models (as assessed by interview) was significantly associated with qualities of friendship interactions, whereas security of attachment styles (as assessed by questionnaire) was not. More dismissing (vs. secure) working models were associated with poorer focus on problem discussions and weaker communication skills with friends, even after accounting for gender differences and current parent-adolescent relationship qualities. We discuss possible mechanisms for the observed links between dimensions of parent-adolescent relationships and friendships. We also consider methodological and conceptual differences between working model and style measures of attachment representations. PMID:20174459

  6. Greater-confinement disposal

    International Nuclear Information System (INIS)

    Trevorrow, L.E.; Schubert, J.P.

    1989-01-01

    Greater-confinement disposal (GCD) is a general term for low-level waste (LLW) disposal technologies that employ natural and/or engineered barriers and provide a degree of confinement greater than that of shallow-land burial (SLB) but possibly less than that of a geologic repository. Thus GCD is associated with lower risk/hazard ratios than SLB. Although any number of disposal technologies might satisfy the definition of GCD, eight have been selected for consideration in this discussion. These technologies include: (1) earth-covered tumuli, (2) concrete structures, both above and below grade, (3) deep trenches, (4) augered shafts, (5) rock cavities, (6) abandoned mines, (7) high-integrity containers, and (8) hydrofracture. Each of these technologies employ several operations that are mature,however, some are at more advanced stages of development and demonstration than others. Each is defined and further described by information on design, advantages and disadvantages, special equipment requirements, and characteristic operations such as construction, waste emplacement, and closure

  7. More features, greater connectivity.

    Science.gov (United States)

    Hunt, Sarah

    2015-09-01

    Changes in our political infrastructure, the continuing frailties of our economy, and a stark growth in population, have greatly impacted upon the perceived stability of the NHS. Healthcare teams have had to adapt to these changes, and so too have the technologies upon which they rely to deliver first-class patient care. Here Sarah Hunt, marketing co-ordinator at Aid Call, assesses how the changing healthcare environment has affected one of its fundamental technologies - the nurse call system, argues the case for wireless such systems in terms of what the company claims is greater adaptability to changing needs, and considers the ever-wider range of features and functions available from today's nurse call equipment, particularly via connectivity with both mobile devices, and ancillaries ranging from enuresis sensors to staff attack alert 'badges'.

  8. Greater oil investment opportunities

    International Nuclear Information System (INIS)

    Arenas, Ismael Enrique

    1997-01-01

    Geologically speaking, Colombia is a very attractive country for the world oil community. According to this philosophy new and important steps are being taken to reinforce the oil sector: Expansion of the exploratory frontier by including a larger number of sedimentary areas, and the adoption of innovative contracting instruments. Colombia has to offer, Greater economic incentives for the exploration of new areas to expand the exploratory frontier, stimulation of exploration in areas with prospectivity for small fields. Companies may offer Ecopetrol a participation in production over and above royalties, without it's participating in the investments and costs of these fields, more favorable conditions for natural gas seeking projects, in comparison with those governing the terms for oil

  9. Adolescent murderers.

    Science.gov (United States)

    Labelle, A; Bradford, J M; Bourget, D; Jones, B; Carmichael, M

    1991-10-01

    Clinical, developmental and environmental factors were retrospectively studied in 14 adolescent murderers who had been referred to a forensic psychiatric clinic over an 11 year period. Results of these analyses were compared with findings from previous reports. The majority of subjects came from split families. There was a greater than expected degree of psychiatric illness in the adolescents. Previous psychiatric contact, antisocial behaviour and substance abuse were common among these adolescents. A tentative profile of adolescents who are likely to commit murder can therefore be drawn up, which may suggest direction for preventive action and rehabilitation.

  10. Farming Approaches for Greater Biodiversity, Livelihoods, and Food Security.

    Science.gov (United States)

    Garibaldi, Lucas A; Gemmill-Herren, Barbara; D'Annolfo, Raffaele; Graeub, Benjamin E; Cunningham, Saul A; Breeze, Tom D

    2017-01-01

    Scientists and policy-makers globally are calling for alternative approaches to conventional intensification of agriculture that enhance ecosystem services provided by biodiversity. The evidence reviewed here suggests that alternative approaches can achieve high crop yields and profits, but the performance of other socioeconomic indicators (as well as long-term trends) is surprisingly poorly documented. Consequently, the implementation of conventional intensification and the discussion of alternative approaches are not based on quantitative evidence of their simultaneous ecological and socioeconomic impacts across the globe. To close this knowledge gap, we propose a participatory assessment framework. Given the impacts of conventional intensification on biodiversity loss and greenhouse gas emissions, such evidence is urgently needed to direct science-policy initiatives, such as the United Nations (UN) 2030 Agenda for Sustainable Development. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  12. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  13. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  14. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  15. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  16. The role of attachment insecurity in the emergence of anxiety symptoms in children and adolescents with migraine: an empirical study.

    Science.gov (United States)

    Williams, Riccardo; Leone, Luigi; Faedda, Noemi; Natalucci, Giulia; Bellini, Benedetta; Salvi, Elisa; Verdecchia, Paola; Cerutti, Rita; Arruda, Marco; Guidetti, Vincenzo

    2017-12-01

    It is widely recognised that there are associations between headache, psychiatric comorbidity and attachment insecurity in both adults and children. The aims of this study were: 1) to compare perceived attachment security and anxiety in children and adolescents with migraine without aura and a healthy control group; 2) to test whether the child's perceived security of attachment to the mother and the father mediated the association between migraine and anxiety. One hundred children and adolescents with Migraine without Aura were compared with a control group of 100 children without headache. The Security Scale (measures perceived security of attachments) and the Self-Administered Psychiatric Scales for Children and Adolescents, a measure of anxiety symptoms, were administered to all participants. The clinical group had lower attachment security than the control group and higher scores on all anxiety scales. Anxiety was negatively correlated with attachment. Children's attachment to their mother mediated the increase in global anxiety in the clinical group. Insecure paternal attachment was associated with greater insecurity in maternal attachment, suggesting that there is a complex pathway from migraine to anxiety symptoms mediated by perceived insecurity of paternal attachment and hence also by perceived insecurity of maternal attachment. These results suggest that insecure parental attachment may exacerbate anxiety in children and adolescents with migraine and point to the importance of multimodal interventions, perhaps taking account of family relationships, for children and adolescents with migraine.

  17. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. A test of the resource security and the body mass index reference point hypotheses of body dissatisfaction amongst adolescents in eight countries.

    Science.gov (United States)

    Mellor, David; Fuller-Tyszkiewicz, Matthew; McCabe, Marita P; Ricciardelli, Lina A; Skouteris, Helen; Mussap, Alexander J

    2014-01-01

    This study aimed to identify cultural-level variables that may influence the extent to which adolescents from different cultural groups are dissatisfied with their bodies. A sample of 1730 male and 2000 female adolescents from Australia, Fiji, Malaysia, Tonga, Tongans in New Zealand, China, Chile, and Greece completed measures of body satisfaction, and the sociocultural influences on body image and body change questionnaire, and self-reported height and weight. Country gross domestic product and national obesity were recorded using global databases. Prevalence of obesity/overweight and cultural endorsement of appearance standards explained variance in individual-level body dissatisfaction (BD) scores, even after controlling for the influence of individual differences in body mass index and internalization of appearance standards. Cultural-level variables may account for the development of adolescent BD.

  19. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  20. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  1. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  3. Adolescents in secure residential care : The role of active and passive coping on general well-being and self-esteem

    NARCIS (Netherlands)

    Barendregt, C.S.; van der Laan, A.M.; Bongers, I.L.; van Nieuwenhuizen, Ch.

    2015-01-01

    Coping, general well-being and self-esteem play an important role during the process of adaptation to turning points in life-course. This study aimed to investigate the effect of coping on both the development of general well-being and self-esteem of adolescents with severe psychiatric problems in

  4. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  5. [Autoerotic fatalities in Greater Dusseldorf].

    Science.gov (United States)

    Hartung, Benno; Hellen, Florence; Borchard, Nora; Huckenbeck, Wolfgang

    2011-01-01

    Autoerotic fatalities in the Greater Dusseldorf area correspond to the relevant medicolegal literature. Our results included exclusively young to middle-aged, usually single men who were found dead in their city apartments. Clothing and devices used showed a great variety. Women's or fetish clothing and complex shackling or hanging devices were disproportionately frequent. In most cases, death occurred due to hanging or ligature strangulation. There was no increased incidence of underlying psychiatric disorders. In most of the deceased no or at least no remarkable alcohol intoxication was found. Occasionally, it may be difficult to reliably differentiate autoerotic accidents, accidents occurring in connection with practices of bondage & discipline, dominance & submission (BDSM) from natural death, suicide or homicide.

  6. Planning for greater confinement disposal

    International Nuclear Information System (INIS)

    Gilbert, T.L.; Luner, C.; Meshkov, N.K.; Trevorrow, L.E.; Yu, C.

    1985-01-01

    A report that provides guidance for planning for greater-confinement disposal (GCD) of low-level radioactive waste is being prepared. The report addresses procedures for selecting a GCD technology and provides information for implementing these procedures. The focus is on GCD; planning aspects common to GCD and shallow-land burial are covered by reference. Planning procedure topics covered include regulatory requirements, waste characterization, benefit-cost-risk assessment and pathway analysis methodologies, determination of need, waste-acceptance criteria, performance objectives, and comparative assessment of attributes that support these objectives. The major technologies covered include augered shafts, deep trenches, engineered structures, hydrofracture, improved waste forms, and high-integrity containers. Descriptive information is provided, and attributes that are relevant for risk assessment and operational requirements are given. 10 refs., 3 figs., 2 tabs

  7. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  8. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  9. Waste management in Greater Vancouver

    Energy Technology Data Exchange (ETDEWEB)

    Carrusca, K. [Greater Vancouver Regional District, Burnaby, BC (Canada); Richter, R. [Montenay Inc., Vancouver, BC (Canada)]|[Veolia Environmental Services, Vancouver, BC (Canada)

    2006-07-01

    An outline of the Greater Vancouver Regional District (GVRD) waste-to-energy program was presented. The GVRD has an annual budget for solid waste management of $90 million. Energy recovery revenues from solid waste currently exceed $10 million. Over 1,660,00 tonnes of GVRD waste is recycled, and another 280,000 tonnes is converted from waste to energy. The GVRD waste-to-energy facility combines state-of-the-art combustion and air pollution control, and has processed over 5 million tonnes of municipal solid waste since it opened in 1988. Its central location minimizes haul distance, and it was originally sited to utilize steam through sales to a recycle paper mill. The facility has won several awards, including the Solid Waste Association of North America award for best facility in 1990. The facility focuses on continual improvement, and has installed a carbon injection system; an ammonia injection system; a flyash stabilization system; and heat capacity upgrades in addition to conducting continuous waste composition studies. Continuous air emissions monitoring is also conducted at the plant, which produces a very small percentage of the total air emissions in metropolitan Vancouver. The GVRD is now seeking options for the management of a further 500,000 tonnes per year of solid waste, and has received 23 submissions from a range of waste energy technologies which are now being evaluated. It was concluded that waste-to-energy plants can be located in densely populated metropolitan areas and provide a local disposal solution as well as a source of renewable energy. Other GVRD waste reduction policies were also reviewed. refs., tabs., figs.

  10. Hurricane Katrina: Barriers to Mental Health Services for Children Persist in Greater New Orleans, Although Federal Grants Are Helping to Address Them. Testimony before the Ad Hoc Subcommittee on Disaster Recovery, Senate Committee on Homeland Security and Governmental Affairs. GAO-09-935T

    Science.gov (United States)

    Bascetta, Cynthia A.

    2009-01-01

    The greater New Orleans area has yet to fully recover from the effects of Hurricane Katrina, which made landfall on August 29, 2005. One issue of concern in the recovery is the availability of mental health services for children. It is estimated that in 2008 about 187,000 children were living in the greater New Orleans area. Many children in the…

  11. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  12. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  13. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  14. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  16. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  17. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  18. Structural and Community Change Outcomes of the Connect-to-Protect Coalitions: Trials and Triumphs Securing Adolescent Access to HIV Prevention, Testing, and Medical Care.

    Science.gov (United States)

    Miller, Robin Lin; Reed, Sarah J; Chiaramonte, Danielle; Strzyzykowski, Trevor; Spring, Hannah; Acevedo-Polakovich, Ignacio D; Chutuape, Kate; Cooper-Walker, Bendu; Boyer, Cherrie B; Ellen, Jonathan M

    2017-09-01

    Connect to Protect (C2P), a 10-year community mobilization effort, pursued the dual aims of creating communities competent to address youth's HIV-related risks and removing structural barriers to youth health. We used Community Coalition Action Theory (CCAT) to examine the perceived contributions and accomplishments of 14 C2P coalitions. We interviewed 318 key informants, including youth and community leaders, to identify the features of coalitions' context and operation that facilitated and undermined their ability to achieve structural change and build communities' capability to manage their local adolescent HIV epidemic effectively. We coded the interviews using an a priori coding scheme informed by CCAT and scholarship on AIDS-competent communities. We found community mobilization efforts like C2P can contribute to addressing the structural factors that promote HIV-risk among youth and to community development. We describe how coalition leadership, collaborative synergy, capacity building, and local community context influence coalitions' ability to successfully implement HIV-related structural change, demonstrating empirical support for many of CCAT's propositions. We discuss implications for how community mobilization efforts might succeed in laying the foundation for an AIDS-competent community. © Society for Community Research and Action 2017.

  19. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  20. Implementing Security Sector Reform

    Science.gov (United States)

    2008-12-04

    ownership and genuine reform. His experience in Diyala Province indicated that the most effective means of pursuing transition and transformation among...that I have no solution to the security situation in Afghanistan, or to the questions of violence, crime, insurrection, or militias vs . army vs ...than to merge those interests into a greater whole. Franchising of problems or solutions is often the result. In Afghanistan, problems and

  1. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  2. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  5. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  6. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  7. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  8. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  9. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  10. Healthier, more nutritious potatoes improve food security in Colombia

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-26

    Apr 26, 2016 ... Healthier, more nutritious potatoes improve food security in Colombia ... farmers, have high commercial potential, and are popular with consumers. ... children and adolescents is an alarming trend throughout the Caribbean.

  11. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.

  12. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  13. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  14. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  15. Conducting Computer Security Assessments at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    Computer security is increasingly recognized as a key component in nuclear security. As technology advances, it is anticipated that computer and computing systems will be used to an even greater degree in all aspects of plant operations including safety and security systems. A rigorous and comprehensive assessment process can assist in strengthening the effectiveness of the computer security programme. This publication outlines a methodology for conducting computer security assessments at nuclear facilities. The methodology can likewise be easily adapted to provide assessments at facilities with other radioactive materials

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  18. Positive valence bias and parent-child relationship security moderate the association between early institutional caregiving and internalizing symptoms

    Science.gov (United States)

    VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim

    2018-01-01

    Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841

  19. Positive valence bias and parent-child relationship security moderate the association between early institutional caregiving and internalizing symptoms.

    Science.gov (United States)

    Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim

    2017-05-01

    Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.

  20. Greater trochanteric pain syndrome diagnosis and treatment.

    Science.gov (United States)

    Mallow, Michael; Nazarian, Levon N

    2014-05-01

    Lateral hip pain, or greater trochanteric pain syndrome, is a commonly seen condition; in this article, the relevant anatomy, epidemiology, and evaluation strategies of greater trochanteric pain syndrome are reviewed. Specific attention is focused on imaging of this syndrome and treatment techniques, including ultrasound-guided interventions. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Food Insecurity and Rural Adolescent Personal Health, Home, and Academic Environments

    Science.gov (United States)

    Shanafelt, Amy; Hearst, Mary O.; Wang, Qi; Nanney, Marilyn S.

    2016-01-01

    Background: Food-insecure (FIS) adolescents struggle in school and with health and mental health more often than food-secure (FS) adolescents. Rural communities experience important disparities in health, but little is known about rural FIS adolescents. This study aims to describe select characteristics of rural adolescents by food-security…

  2. Enlisting Canadians for greater impact | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Global Citizenship Small Grants, for example, enable Canadian organizations to address issues of social and economic justice, environmental protection, participation, peace and security, and human rights in a global perspective. Now in its 15th year, the program demonstrates the Centre's commitment to working with ...

  3. Depression, Hopelessness, and Self-Esteem: Accounting for Suicidality in Adolescent Psychiatric Inpatients.

    Science.gov (United States)

    Dori, Galit A.; Overholser, James C.

    1999-01-01

    Depressed adolescents who had never attempted suicide were compared to depressed adolescents who had attempted suicide. Results showed suicidal adolescents experienced significantly greater depression and hopelessness than did nonsuicidal adolescents. However, suicidal and nonsuicidal adolescents reported similar low levels of self esteem.…

  4. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  5. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  6. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  7. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  8. Social Security for Composers and Free Lances.

    Science.gov (United States)

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  9. Attachment's Links With Adolescents' Social Emotions: The Roles of Negative Emotionality and Emotion Regulation.

    Science.gov (United States)

    Murphy, Tia Panfile; Laible, Deborah J; Augustine, Mairin; Robeson, Lindsay

    2015-01-01

    Recent research has attempted to explain the mechanisms through which parental attachment affects social and emotional outcomes (e.g., Burnette, Taylor, Worthington, & Forsyth, 2007 ; Panfile & Laible, 2012 ). The authors' goal was to examine negative emotionality and emotion regulation as mediators of the associations that attachment has with empathy, forgiveness, guilt, and jealousy. One hundred forty-eight adolescents reported their parental attachment security, general levels of negative emotionality and abilities to regulate emotional responses, and tendencies to feel empathy, forgiveness, guilt, and jealousy. Results revealed that attachment security was associated with higher levels of empathy, forgiveness, and guilt, but lower levels of jealousy. In addition, emotion regulation mediated the links attachment shared with both empathy and guilt, such that higher levels of attachment security were linked with greater levels of emotion regulation, which led to greater levels of empathy and guilt. Alternatively, negative emotionality mediated the links attachment shared with both forgiveness and jealousy, such that higher levels of attachment security were associated with lower levels of negative emotionality, which in turn was linked to lower levels of forgiveness and higher levels of jealousy. This study provides a general picture of how attachment security may play a role in shaping an individual's levels of social emotions.

  10. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  11. Dye filled security seal

    International Nuclear Information System (INIS)

    Wilson, D.C.

    1982-01-01

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member

  12. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  13. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  14. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  15. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  16. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  19. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  20. Simultaneous bilateral isolated greater trochanter fracture

    Directory of Open Access Journals (Sweden)

    Maruti Kambali

    2013-01-01

    Full Text Available A 48-year-old woman sustained simultaneous isolated bilateral greater trochanteric fracture, following a road traffic accident. The patient presented to us 1 month after the injury. She presented with complaints of pain in the left hip and inability to walk. Roentgenograms revealed displaced comminuted bilateral greater trochanter fractures. The fracture of the left greater trochanter was reduced and fixed internally using the tension band wiring technique. The greater trochanter fracture on the right side was asymptomatic and was managed conservatively. The patient regained full range of motion and use of her hips after a postoperative follow-up of 6 months. Isolated fractures of the greater trochanter are unusual injuries. Because of their relative rarity and the unsettled controversy regarding their etiology and pathogenesis, several methods of treatment have been advocated. Furthermore, the reports of this particular type of injury are not plentiful and the average textbook coverage afforded to this entity is limited. In our study we discuss the mechanism of injury and the various treatment options available.

  1. Adolescent attachment, family functioning and depressive symptoms

    Directory of Open Access Journals (Sweden)

    Nishola Rawatlal

    2015-08-01

    Full Text Available Background. Adolescence represents a challenging transitional period where changes in biological, emotional, cognitive and social domains can increase the risk of developing internalised problems including subthreshold depression. Adolescent-parent attachment style, perceived support and family functioning may increase risk for depressive symptoms or may reduce such risk. Adolescent-parent attachment, adolescent-perceived support from parents and family functioning were examined as correlates of depressive symptom presentation within this age group. Methods. Participants included a maternal parent and an adolescent (65.5% female from each family. Adolescents were in Grade 7 (n=175 or Grade 10 (n=31. Data were collected through home interviews. The Self-Report of Family Inventory (SFI, Experiences of Close Relationships Scale (ECR, Network of Relationships Inventory (NRI, Children’s Depression Inventory (CDI and Child Behavior Checklist (CBCL were used to assess depression, parental support and attachment.  Results. Two models were examined: one with adolescent report of depressive symptoms as the outcome and a second with parent report of adolescent internalising symptoms as the outcome. The model predicting adolescent-reported depressive symptoms was significant with older age, higher levels of avoidant attachment, and higher levels of youth-reported dysfunctional family interaction associated with more depressive symptomatology. In the model predicting parent report of adolescent internalising symptoms only higher levels of dysfunctional family interaction, as reported by the parent, were associated with higher levels of internalising symptoms. Conclusion. Positive family communication, cohesion and support predictive of a secure parent-adolescent attachment relationship reduced the risk of a depressive symptom outcome. Secure adolescents were able to regulate their emotions, knowing that they could seek out secure base attachment relations

  2. Barriers to health education in adolescents: health care providers' perspectives compared to high school adolescents.

    Science.gov (United States)

    Abedian, Kobra; Shahhosseini, Zohreh

    2015-11-01

    Although adolescence is marked by profound and dynamic changes, it is virtually neglected by health care providers, by society, and even by most parents, teachers, and health professionals. The aim of this study was to investigate barriers to health education in adolescents from health care providers' views compared to teens. The study population consisted of 72 health care providers and 402 high school female students in Northern Iran in 2012. They completed a self-administered questionnaire about their views on barriers to adolescents' health education. It is revealed that the major barrier to adolescents' health education from a health care providers' perspective is "Lack of private room for adolescents' health education", while "Lack of adolescents' interest to content of educational programs" is a significantly greater barrier to health education among adolescents. The results suggest that for adolescent health education, specific strategies should be used in adolescent health promotion programs.

  3. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  4. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  5. Greater trochanteric fracture with occult intertrochanteric extension.

    Science.gov (United States)

    Reiter, Michael; O'Brien, Seth D; Bui-Mansfield, Liem T; Alderete, Joseph

    2013-10-01

    Proximal femoral fractures are frequently encountered in the emergency department (ED). Prompt diagnosis is paramount as delay will exacerbate the already poor outcomes associated with these injuries. In cases where radiography is negative but clinical suspicion remains high, magnetic resonance imaging (MRI) is the study of choice as it has the capability to depict fractures which are occult on other imaging modalities. Awareness of a particular subset of proximal femoral fractures, namely greater trochanteric fractures, is vital for both radiologists and clinicians since it has been well documented that they invariably have an intertrochanteric component which may require surgical management. The detection of intertrochanteric or cervical extension of greater trochanteric fractures has been described utilizing MRI but is underestimated with both computed tomography (CT) and bone scan. Therefore, if MRI is unavailable or contraindicated, the diagnosis of an isolated greater trochanteric fracture should be met with caution. The importance of avoiding this potential pitfall is demonstrated in the following case of an elderly woman with hip pain and CT demonstrating an isolated greater trochanteric fracture who subsequently returned to the ED with a displaced intertrochanteric fracture.

  6. Butterfly valves: greater use in power plants

    International Nuclear Information System (INIS)

    McCoy, M.

    1975-01-01

    Improvements in butterfly valves, particularly in the areas of automatic control and leak tightness are described. The use of butterfly valves in nuclear power plants is discussed. These uses include service in component cooling, containment cooling, and containment isolation. The outlook for further improvements and greater uses is examined. (U.S.)

  7. Greater Somalia, the never-ending dream?

    DEFF Research Database (Denmark)

    Zoppi, Marco

    2015-01-01

    This paper provides an historical analysis of the concept of Greater Somalia, the nationalist project that advocates the political union of all Somali-speaking people, including those inhabiting areas in current Djibouti, Ethiopia and Kenya. The Somali territorial unification project of “lost...

  8. Neural representation of expected value in the adolescent brain.

    Science.gov (United States)

    Barkley-Levenson, Emily; Galván, Adriana

    2014-01-28

    Previous work shows that the adolescent reward system is hyperactive, but this finding may be confounded by differences in how teens value money. To address this, we examined the neural ontogeny of objective value representation. Adolescent and adult participants performed a monetary gambling task in which they chose to accept or reject gambles of varying expected value. Increasing expected value had a stronger influence over gambling choices in adolescents relative to adults, an effect that was paralleled by greater activation in the ventral striatum in adolescents. This unique adolescent ventral striatum response remained even after matching groups on acceptance behavior. These behavioral and neural data suggest that the value of available options has a greater influence in adolescent versus adult choices, even when objective value and subjective choice are held constant. This research provides further evidence that hyperactivation of reward circuitry in adolescence may be a normative ontogenetic shift that is due to greater valuation in the adolescent brain.

  9. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  10. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  11. Improvements in Interpersonal Functioning Following Interpersonal Psychotherapy (IPT) with Adolescents and their Association with Change in Depression.

    Science.gov (United States)

    Spence, Susan H; O'Shea, Gabrielle; Donovan, Caroline L

    2016-05-01

    This study adds to the body of evidence regarding the theoretical underpinnings of interpersonal psychotherapy and the mechanisms through which it impacts upon depression in adolescents. The aims were to determine whether the interpersonal constructs proposed to underpin interpersonal psychotherapy do indeed change in response to this therapy and whether such changes are associated with changes in depression in young people. Thirty-nine adolescents, aged 13-19 years, with a primary diagnosis of major depressive disorder, were randomly assigned in blocks to group or individual treatment. Assessments were conducted at pre and posttreatment, and 12-month follow-up. The results supported the hypotheses, with significant improvements in social skills, social functioning, and the quality of parent-adolescent relationships, and an increase in secure attachment style and decrease in insecure attachment style being evident following treatment. Benefits were maintained at 12-month follow-up. Adolescents who showed greater reductions in depressive symptoms over this period tended to also show greater improvement in parent reported social skills, quality of the parent-adolescent relationship, and attachment style from pretreatment to 12-month follow-up. The findings are consistent with the proposed underpinnings of interpersonal psychotherapy. Adolescents showed significant improvements in interpersonal functioning and changes in attachment style following treatment, and changes in social skills, parent-adolescent conflict and attachment style were associated with reductions in depression. As such, the results add to the body of knowledge regarding the construct validity of interpersonal psychotherapy as an intervention for depression in young people. Clinical implications and directions for future research are discussed.

  12. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  13. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  14. Friendship quantity and quality as predictors of rejection sensitivity in adolescents

    Directory of Open Access Journals (Sweden)

    Gabriela Šeboková

    2014-12-01

    (greater or lesser contributions to rejection sensitivity. Different types of peer relations can moderate and mediate each other´s influence on specific types of internalizing problems in adolescents. The future research simultaneously examining more types of peer relationship is needed. There has been empirical evidence that girls have more quality friendships which provide them more emotional and instrumental support, than for boys. Our results support this empirical evidence. Regression analysis indicated, that balance (large effect size, help, security and closeness in friendship (small to medium effect size and overall friendship quality (medium effect size are significant unique predictors of rejection sensitivity for adolescent girls, but not for boys. Results suggest that predictors of sensitivity rejection in boys are other than interpersonal factors, for example personal or coping strategies. Further directions in research are discussed.

  15. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  16. Long-term effects of adolescent obesity: time to act.

    Science.gov (United States)

    Reinehr, Thomas

    2018-03-01

    Obesity in adolescence will probably have major implications not only for the affected adolescents but also for society. Those who have obesity during adolescence usually have obesity into adulthood, which causes many medical and psychological issues that can result in premature death. Furthermore, obesity in adolescents is associated with a range of social problems, including difficulties securing an apprenticeship or a job or finding a partner. Adolescents with obesity are also at increased risk of having children with obesity later in life. All these consequences lead to high costs for the health-care system. Although efficient treatment options are available that have been proven in randomized controlled trials, such as lifestyle interventions for adolescents with obesity and bariatric surgery for adolescents with severe obesity, these interventions frequently fail in clinical practice as treatment adherence is low in adolescents and most adolescents with obesity do not seek medical care. Therefore, improving treatment adherence and identifying treatment barriers are necessary.

  17. Utilization of wind energy in greater Hanover

    International Nuclear Information System (INIS)

    Sahling, U.

    1993-01-01

    Since the beginning of the Eighties, the association of communities of Greater Hanover has dealt intensively with energy and ecopolitical questions in the scope of regional planning. Renewable energy sources play a dominant role in this context. This brochure is the third contribution to the subject ''Energy policy and environmental protection''. Experts as well as possibly interested parties are addressed especially. For all 8 contributions contained, separate entries have been recorded in this database. (BWI) [de

  18. Small cities face greater impact from automation

    OpenAIRE

    Frank, Morgan R.; Sun, Lijun; Cebrian, Manuel; Youn, Hyejin; Rahwan, Iyad

    2017-01-01

    The city has proven to be the most successful form of human agglomeration and provides wide employment opportunities for its dwellers. As advances in robotics and artificial intelligence revive concerns about the impact of automation on jobs, a question looms: How will automation affect employment in cities? Here, we provide a comparative picture of the impact of automation across U.S. urban areas. Small cities will undertake greater adjustments, such as worker displacement and job content su...

  19. Problem of Information Security Traffic on Internet

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2012-10-01

    Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.

  20. The Greater Sekhukhune-CAPABILITY outreach project.

    Science.gov (United States)

    Gregersen, Nerine; Lampret, Julie; Lane, Tony; Christianson, Arnold

    2013-07-01

    The Greater Sekhukhune-CAPABILITY Outreach Project was undertaken in a rural district in Limpopo, South Africa, as part of the European Union-funded CAPABILITY programme to investigate approaches for capacity building for the translation of genetic knowledge into care and prevention of congenital disorders. Based on previous experience of a clinical genetic outreach programme in Limpopo, it aimed to initiate a district clinical genetic service in Greater Sekhukhune to gain knowledge and experience to assist in the implementation and development of medical genetic services in South Africa. Implementing the service in Greater Sekhukhune was impeded by a developing staff shortage in the province and pressure on the health service from the existing HIV/AIDS and TB epidemics. This situation underscores the need for health needs assessment for developing services for the care and prevention of congenital disorders in middle- and low-income countries. However, these impediments stimulated the pioneering of innovate ways to offer medical genetic services in these circumstances, including tele-teaching of nurses and doctors, using cellular phones to enhance clinical care and adapting and assessing the clinical utility of a laboratory test, QF-PCR, for use in the local circumstances.

  1. Operational technology for greater confinement disposal

    International Nuclear Information System (INIS)

    Dickman, P.T.; Vollmer, A.T.; Hunter, P.H.

    1984-12-01

    Procedures and methods for the design and operation of a greater confinement disposal facility using large-diameter boreholes are discussed. It is assumed that the facility would be located at an operating low-level waste disposal site and that only a small portion of the wastes received at the site would require greater confinement disposal. The document is organized into sections addressing: facility planning process; facility construction; waste loading and handling; radiological safety planning; operations procedures; and engineering cost studies. While primarily written for low-level waste management site operators and managers, a detailed economic assessment section is included that should assist planners in performing cost analyses. Economic assessments for both commercial and US government greater confinement disposal facilities are included. The estimated disposal costs range from $27 to $104 per cubic foot for a commercial facility and from $17 to $60 per cubic foot for a government facility. These costs are based on average site preparation, construction, and waste loading costs for both contact- and remote-handled wastes. 14 figures, 22 tables

  2. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  3. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  4. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  5. Politics, Security and Early Ideas of ‘Greater Malaysia’, 1945-1961

    OpenAIRE

    Fernando, Joseph M.; Rajagopal, Shanthiah

    2017-01-01

    The formation of the Federation of Malaysia in 1963 remains a source of much debate among historians. The official announcement by the Prime Minister of Malaya, Tunku Abdul Rahman, on 27 May 1961, urging a closer association of Malaya, Singapore and the three British-controlled Borneo territories is viewed by some studies as the trigger that led to the formation of Malaysia on 16 September 1963. While this study recognizes that Tunku’s proposal of May 1961 was a catalyst to the formal negotia...

  6. CRITICAL REVIEW OF OPENSTACK SECURITY: ISSUES AND WEAKNESSES

    OpenAIRE

    Hala Albaroodi; Selvakumar Manickam; Parminder Singh

    2014-01-01

    The purpose of this study is to examine the state of both cloud computing security in general and OpenStack in particular. Conducting a reassessment of cloud computing security can provide a greater understanding of how cloud computing functions and what types of security issues arise therein. This study is divided into two parts; in the first part, the background of cloud computing and its different deployment models are discussed. This section also describes various security challenges that...

  7. Sexual predators, energy development, and conservation in greater Yellowstone.

    Science.gov (United States)

    Berger, Joel; Beckmann, Jon P

    2010-06-01

    In the United States, as elsewhere, a growing debate pits national energy policy and homeland security against biological conservation. In rural communities the extraction of fossil fuels is often encouraged because of the employment opportunities it offers, although the concomitant itinerant workforce is often associated with increased wildlife poaching. We explored possible positive and negative factors associated with energy extraction in the Greater Yellowstone Ecosystem (GYE), an area known for its national parks, intact biological diversity, and some of the New World's longest terrestrial migrations. Specifically, we asked whether counties with different economies-recreation (ski), agrarian (ranching or farming), and energy extractive (petroleum)-differed in healthcare (gauged by the abundance of hospital beds) and in the frequency of sexual predators. The absolute and relative frequency of registered sex offenders grew approximately two to three times faster in areas reliant on energy extraction. Healthcare among counties did not differ. The strong conflation of community dishevel, as reflected by in-migrant sexual predators, and ecological decay in Greater Yellowstone is consistent with patterns seen in similar systems from Ecuador to northern Canada, where social and environmental disarray exist around energy boomtowns. In our case, that groups (albeit with different aims) mobilized campaigns to help maintain the quality of rural livelihoods by protecting open space is a positive sign that conservation can matter, especially in the face of rampant and poorly executed energy extraction projects. Our findings further suggest that the public and industry need stronger regulatory action to instill greater vigilance when and where social factors and land conversion impact biological systems.

  8. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  9. Adolescent rationality.

    Science.gov (United States)

    Moshman, David

    2013-01-01

    Adolescents are commonly seen as irrational, a position supported to varying degrees by many developmentalists, who often appeal to recent research on adolescent brains. Careful review of relevant evidence, however, shows that (1) adults are less rational than is generally assumed, (2) adolescents (and adults) are categorically different from children with respect to the attainment of advanced levels of rationality and psychological functioning, and (3) adolescents and adults do not differ categorically from each other with respect to any rational competencies, irrational tendencies, brain structures, or neurological functioning. Development often continues in adolescence and beyond but categorical claims about adolescents as distinct from adults cannot be justified. A review of U.S. Supreme Court decisions concerning intellectual freedom, reproductive freedom, and criminal responsibility shows ongoing ambivalence and confusion about the rationality of adolescents. Developmental theory and research suggest that adolescents should be conceptualized as young adults, not immature brains, with important implications for their roles, rights, and responsibilities.

  10. Greater happiness for a greater number: Is that possible in Austria?

    NARCIS (Netherlands)

    R. Veenhoven (Ruut)

    2011-01-01

    textabstractWhat is the final goal of public policy? Jeremy Bentham (1789) would say: greater happiness for a greater number. He thought of happiness as subjective enjoyment of life; in his words as “the sum of pleasures and pains”. In his time the happiness of the great number could not be measured

  11. Greater happiness for a greater number: Is that possible? If so how? (Arabic)

    NARCIS (Netherlands)

    R. Veenhoven (Ruut); E. Samuel (Emad)

    2012-01-01

    textabstractWhat is the final goal of public policy? Jeremy Bentham (1789) would say: greater happiness for a greater number. He thought of happiness as subjective enjoyment of life; in his words as “the sum of pleasures and pains”. In his time, the happiness of the great number could not be

  12. Greater happiness for a greater number: Is that possible in Germany?

    NARCIS (Netherlands)

    R. Veenhoven (Ruut)

    2009-01-01

    textabstractWhat is the final goal of public policy? Jeremy Bentham (1789) would say: greater happiness for a greater number. He thought of happiness as subjective enjoyment of life; in his words as “the sum of pleasures and pains”. In his time the Happiness of the great number could not be measured

  13. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  14. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  15. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  16. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  17. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  18. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  19. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  20. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  1. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  2. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  3. Search for greater stability in nuclear regulation

    International Nuclear Information System (INIS)

    Asselstine, J.K.

    1985-01-01

    The need for greater stability in nuclear regulation is discussed. Two possible approaches for dealing with the problems of new and rapidly changing regulatory requirements are discussed. The first approach relies on the more traditional licensing reform initiatives that have been considered off and on for the past decade. The second approach considers a new regulator philosophy aimed at the root causes of the proliferation of new safety requirements that have been imposed in recent years. For the past few years, the concepts of deregulation and regulatory reform have been in fashion in Washington, and the commercial nuclear power program has not remained unaffected. Many look to these concepts to provide greater stability in the regulatory program. The NRC, the nuclear industry and the administration have all been avidly pursuing regulatory reform initiatives, which take the form of both legislative and administrative proposals. Many of these proposals look to the future, and, if adopted, would have little impact on currently operating nuclear power plants or plants now under construction

  4. Greater Sudbury fuel efficient driving handbook

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-12-15

    Reducing the amount of fuel that people use for personal driving saves money, improves local air quality, and reduces personal contributions to climate change. This handbook was developed to be used as a tool for a fuel efficient driving pilot program in Greater Sudbury in 2009-2010. Specifically, the purpose of the handbook was to provide greater Sudbury drivers with information on how to drive and maintain their personal vehicles in order to maximize fuel efficiency. The handbook also provides tips for purchasing fuel efficient vehicles. It outlines the benefits of fuel maximization, with particular reference to reducing contributions to climate change; reducing emissions of air pollutants; safe driving; and money savings. Some tips for efficient driving are to avoid aggressive driving; use cruise control; plan trips; and remove excess weight. Tips for efficient winter driving are to avoid idling to warm up the engine; use a block heater; remove snow and ice; use snow tires; and check tire pressure. The importance of car maintenance and tire pressure was emphasized. The handbook also explains how fuel consumption ratings are developed by vehicle manufacturers. refs., figs.

  5. Women at greater risk of HIV infection.

    Science.gov (United States)

    Mahathir, M

    1997-04-01

    Although many people believe that mainly men get infected with HIV/AIDS, women are actually getting infected at a faster rate than men, especially in developing countries, and suffer more from the adverse impact of AIDS. As of mid-1996, the Joint UN Program on AIDS estimated that more than 10 million of the 25 million adults infected with HIV since the beginning of the epidemic are women. The proportion of HIV-positive women is growing, with almost half of the 7500 new infections daily occurring among women. 90% of HIV-positive women live in a developing country. In Asia-Pacific, 1.4 million women have been infected with HIV out of an estimated total 3.08 million adults from the late 1970s until late 1994. Biologically, women are more vulnerable than men to infection because of the greater mucus area exposed to HIV during penile penetration. Women under age 17 years are at even greater risk because they have an underdeveloped cervix and low vaginal mucus production. Concurrent sexually transmitted diseases increase the risk of HIV transmission. Women's risk is also related to their exposure to gender inequalities in society. The social and economic pressures of poverty exacerbate women's risk. Prevention programs are discussed.

  6. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  7. Divorce, Remarriage, and Adolescent Substance Use: A Prospective Longitudinal Study.

    Science.gov (United States)

    Needle, Richard H.; And Others

    1990-01-01

    Examined substance use in adolescents who experienced parental divorce during childhood, during adolescence, or who were from intact families. Adolescence divorce group had greater overall drug involvement. Divorce had negative effect on boys but not on girls. Custodial parents' remarriage led to increased substance use among girls, decreased…

  8. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  9. Parent-adolescent relationships and its association to adolescents' self-esteem.

    Science.gov (United States)

    Yaacob, Mohd Jamil Bin

    2006-01-01

    Psychoanalysts believed that early mother-child relationships form the prototype of all future relationships and the outcome of adolescents development depends on their ego-strength. Object relations theory believed that intrapsychic process mediates interpersonal interaction to develop a sense of secure self and adolescents must relinquish the internalized other in order to develop a more mature sense of self. Social-relation theory believed that mothers and fathers provide different socialization experiences. Self-esteem depends on the functioning of the whole family in which adolescent is intimately related to the dyadic relationship in a family. There is an association between interparental conflict and adolescent's self-esteem and problem behaviour.

  10. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  11. USAID Adolescent Girl Strategy Implementation Plan

    Science.gov (United States)

    US Agency for International Development, 2016

    2016-01-01

    USAID's commitment to empowering adolescent girls to reach their full potential is reflected in the Agency's larger efforts to achieve gender equality and women's empowerment. The Agency holds decades of experience leading advances for greater gender equality and empowerment that benefit adolescent girls; however, these activities have not been…

  12. Small cities face greater impact from automation.

    Science.gov (United States)

    Frank, Morgan R; Sun, Lijun; Cebrian, Manuel; Youn, Hyejin; Rahwan, Iyad

    2018-02-01

    The city has proved to be the most successful form of human agglomeration and provides wide employment opportunities for its dwellers. As advances in robotics and artificial intelligence revive concerns about the impact of automation on jobs, a question looms: how will automation affect employment in cities? Here, we provide a comparative picture of the impact of automation across US urban areas. Small cities will undertake greater adjustments, such as worker displacement and job content substitutions. We demonstrate that large cities exhibit increased occupational and skill specialization due to increased abundance of managerial and technical professions. These occupations are not easily automatable, and, thus, reduce the potential impact of automation in large cities. Our results pass several robustness checks including potential errors in the estimation of occupational automation and subsampling of occupations. Our study provides the first empirical law connecting two societal forces: urban agglomeration and automation's impact on employment. © 2018 The Authors.

  13. Small cities face greater impact from automation

    Science.gov (United States)

    Sun, Lijun; Cebrian, Manuel; Rahwan, Iyad

    2018-01-01

    The city has proved to be the most successful form of human agglomeration and provides wide employment opportunities for its dwellers. As advances in robotics and artificial intelligence revive concerns about the impact of automation on jobs, a question looms: how will automation affect employment in cities? Here, we provide a comparative picture of the impact of automation across US urban areas. Small cities will undertake greater adjustments, such as worker displacement and job content substitutions. We demonstrate that large cities exhibit increased occupational and skill specialization due to increased abundance of managerial and technical professions. These occupations are not easily automatable, and, thus, reduce the potential impact of automation in large cities. Our results pass several robustness checks including potential errors in the estimation of occupational automation and subsampling of occupations. Our study provides the first empirical law connecting two societal forces: urban agglomeration and automation's impact on employment. PMID:29436514

  14. Planning for greater-confinement disposal

    International Nuclear Information System (INIS)

    Gilbert, T.L.; Luner, C.; Meshkov, N.K.; Trevorrow, L.E.; Yu, C.

    1984-01-01

    This contribution is a progress report for preparation of a document that will summarize procedures and technical information needed to plan for and implement greater-confinement disposal (GCD) of low-level radioactive waste. Selection of a site and a facility design (Phase I), and construction, operation, and extended care (Phase II) will be covered in the document. This progress report is limited to Phase I. Phase I includes determination of the need for GCD, design alternatives, and selection of a site and facility design. Alternative designs considered are augered shafts, deep trenches, engineered structures, high-integrity containers, hydrofracture, and improved waste form. Design considerations and specifications, performance elements, cost elements, and comparative advantages and disadvantages of the different designs are covered. Procedures are discussed for establishing overall performance objectives and waste-acceptance criteria, and for comparative assessment of the performance and cost of the different alternatives. 16 references

  15. Greater confinement disposal of radioactive wastes

    International Nuclear Information System (INIS)

    Trevorrow, L.E.; Gilbert, T.L.; Luner, C.; Merry-Libby, P.A.; Meshkov, N.K.; Yu, C.

    1985-01-01

    Low-level radioactive waste (LLW) includes a broad spectrum of different radionuclide concentrations, half-lives, and hazards. Standard shallow-land burial practice can provide adequate protection of public health and safety for most LLW. A small volume fraction (approx. 1%) containing most of the activity inventory (approx. 90%) requires specific measures known as greater-confinement disposal (GCD). Different site characteristics and different waste characteristics - such as high radionuclide concentrations, long radionuclide half-lives, high radionuclide mobility, and physical or chemical characteristics that present exceptional hazards - lead to different GCD facility design requirements. Facility design alternatives considered for GCD include the augered shaft, deep trench, engineered structure, hydrofracture, improved waste form, and high-integrity container. Selection of an appropriate design must also consider the interplay between basic risk limits for protection of public health and safety, performance characteristics and objectives, costs, waste-acceptance criteria, waste characteristics, and site characteristics

  16. Planning for greater-confinement disposal

    International Nuclear Information System (INIS)

    Gilbert, T.L.; Luner, C.; Meshkov, N.K.; Trevorrow, L.E.; Yu, C.

    1984-01-01

    This contribution is a progress report for preparation of a document that will summarize procedures and technical information needed to plan for and implement greater-confinement disposal (GCD) of low-level radioactive waste. Selection of a site and a facility design (Phase I), and construction, operation, and extended care (Phase II) will be covered in the document. This progress report is limited to Phase I. Phase I includes determination of the need for GCD, design alternatives, and selection of a site and facility design. Alternative designs considered are augered shafts, deep trenches, engineered structures, high-integrity containers, hydrofracture, and improved waste form. Design considerations and specifications, performance elements, cost elements, and comparative advantages and disadvantages of the different designs are covered. Procedures are discussed for establishing overall performance objecties and waste-acceptance criteria, and for comparative assessment of the performance and cost of the different alternatives. 16 refs

  17. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  18. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  19. Adolescent Perceptions of the School Nurse.

    Science.gov (United States)

    Resnick, Michael D.; And Others

    1980-01-01

    An expanded role, greater participation, visibility, and publicity would help to obviate the adverse stereotypes of the school nurse and would provide a foundation to address tasks and issues that adolescents and educators find pressing. (CJ)

  20. Pregnant adolescent victims of intrafamilial violence in Brazil: Psychological and social consequences

    Directory of Open Access Journals (Sweden)

    Paula Orchiucci Miura

    2015-11-01

    Full Text Available Adolescence pregnancy is a complex issue that must be studied, considering the social, economic, family and the psychological aspects of each adolescent. There is more complexity when these adolescents have suffered domestic violence. Domestic violence is a serious public health problem because affects the physical and psychological integrity of the victims. Many women who become pregnant have been victims of some form of domestic violence by their partners along the married life. This paper paper presents data of research as is part of a larger project entitled ´Domestic Violence Study against Adolescents Pregnant Attended at the University Hospital of São Paulo: Basis for Intervention´. The objectives are to identify the accumulated incidence and the experience of pregnant adolescents in face of domestic violence, in special he psychosocial vulnerability, understanding and comparing the lived experience on the pregnant adolescents victims and not victims of domestic violence. Forty pregnant adolescents have participated in this study, being 20 victims of domestic violence (Group 1 and 20 non-victims (Group 2 attending the University Hospital of São Paulo and another institutions partner of Psychology Institute of USP. This is an exploratory and descriptive research, quantitative and qualitative. The instruments used were: a form to characterize the profile of production and social reproduction, semi-structured interview. The qualitative data analysis was performed according to Bardin proposal (2013. How results were found: In the group 1 drug use during pregnancy, and lack of trust in health professionals. The showed lack of confidence and support of family, partner abandonment and violence, insecurity, low self esteem and hopelessness. In the group 2 were found: high self-esteem; confidence and family support; security in the relationship with the partner; good prospects for the future; some unfavorable aspects were found in group 2 that

  1. Siblings of Individuals with an Autism Spectrum Disorder: Sibling Relationships and Wellbeing in Adolescence and Adulthood

    Science.gov (United States)

    Orsmond, Gael I.; Kuo, Hsin-Yu; Seltzer, Marsha Mailick

    2009-01-01

    We investigated sibling relationships and wellbeing in adolescents and adults with a sibling with an autism spectrum disorder (ASD). Adolescents engaged in more shared activities than did adults. Adolescents reported greater social support, greater use of emotion-focused coping strategies, and less use of problem-focused coping than adults. In…

  2. The second international workshop on enterprise security

    OpenAIRE

    Chang, V; Ramachandran, M; Yen, NN; Walters, RJ; Wills, G

    2016-01-01

    Welcome to our second international workshop on Enterprise Security as part of CloudCom 2015, Vancouver, Canada, November 30-December 3, 2015. The first international workshop held in Singapore has been a major success since then we have achieved greater team activities, research, and international collaborations as the major and significant outcome of our first workshop on this topic. Enterprise Security involves all business, products, governments, organization, and their contractors. This ...

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  5. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  6. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  7. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  8. Urban acid deposition in Greater Manchester

    Energy Technology Data Exchange (ETDEWEB)

    Lee, D.S.; Longhurst, J.W.S.; Gee, D.R.; Hare, S.E. (Manchester Polytechnic, Manchester (UK). Acid Rain Information Centre)

    1989-08-01

    Data are presented from a monitoring network of 18 bulk precipitation collectors and one wet-only collector in the urban area of Greater Manchester, in the north west of England. Weekly samples were analysed for all the major ions in precipitation along with gaseous nitrogen dioxide concentrations from diffusion tubes. Statistical analysis of the data shows significant spatial variation of non marine sulphate, nitrate, ammonium, acidity and calcium concentrations, and nitrogen dioxide concentrations. Calcium is thought to be responsible for the buffering of acidity and is of local origin. Wet deposition is the likely removal process for calcium in the atmosphere and probably by below cloud scavenging. Nitrate and ammonium concentrations and depositions show close spatial, temporal and statistical association. Examination of high simultaneous episodes of nitrate and ammonium deposition shows that these depositions cannot be explained in terms of trajectories and it is suggested that UK emissions of ammonia may be important. Statistical analysis of the relationships between nitrate and ammonium depositions, concentrations and precipitation amount suggest that ammonia from mesoscale sources reacts reversibly with nitric acid aerosol and is removed by below cloud scavenging. High episodes of the deposition of non marine sulphate are difficult to explain by trajectory analysis alone, perhaps suggesting local sources. In a comparison between wet deposition and bulk deposition, it was shown that only 15.2% of the non marine sulphur was dry deposited to the bulk precipitation collector. 63 refs., 86 figs., 31 tabs.

  9. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  12. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  13. Attachment Styles among Bullies, Victims and Uninvolved Adolescents

    Science.gov (United States)

    Koiv, Kristi

    2012-01-01

    Attachment theory provides a frame for understanding the role of attachment styles in the development of bullying behaviour in adolescence. The present study examined attachment styles (secure, avoidant and anxious/ambivalent) that differentiated bullies, victims, bully/victims and uninvolved adolescents. A total of 1,921 students (1,006 girls and…

  14. Parent-adolescent relations and adolescent functioning: self-esteem, substance abuse, and delinquency.

    Science.gov (United States)

    Parker, Jennifer S; Benson, Mark J

    2004-01-01

    The present study examined parental support and monitoring as they relate to adolescent outcomes. It was hypothesized that support and monitoring would be associated with higher self-esteem and less risky behavior during adolescence. The diverse sample included 16,749 adolescents assessed as part of the National Educational Longitudinal Study. Both high parental support and parental monitoring were related to greater self-esteem and lower risk behaviors. The findings partially confirm, as well as extend, propositions in attachment theory.

  15. National Survey of Child and Adolescent Well-Being, No. 12: Estimates of Supplemental Security Income Eligibility for Children in Out-of-Home Placements. Research Brief: Findings from the NSCAW Study

    Science.gov (United States)

    US Department of Health and Human Services, 2008

    2008-01-01

    Children who have been placed in foster care have been found to be at a high risk of having a medical, social or behavioral disability. This brief, one in a series of briefs addressing access to services for children in the child welfare system, examines Supplemental Security Income (SSI) eligibility among children living in out-of-home placements…

  16. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  17. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  18. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  19. Measuring risky adolescent cycling behaviour.

    Science.gov (United States)

    Feenstra, Hans; Ruiter, Robert A C; Schepers, Jan; Peters, Gjalt-Jorn; Kok, Gerjo

    2011-09-01

    Adolescents are at a greater risk of being involved in traffic accidents than most other age groups, even before they start driving cars. This article aims to determine the factor structure of a self-report questionnaire measuring adolescent risky cycling behaviour, the ACBQ (Adolescent Cycling Behaviour Questionnaire). The questionnaire's structure was based on the widely used Driver Behaviour Questionnaire (DBQ). A sample of secondary school students (N = 1749; age range: 13-18 years) filled out the questionnaire. Factor analysis revealed a three-factor structure underlying the questionnaire, which was confirmed on two equally large portions of the entire sample. These three underlying factors were identified as errors, common violations and exceptional violations. The ACBQ is a useful instrument for measuring adolescents' risky cycling behaviour.

  20. Energy security and sustainability in Northeast Asia

    International Nuclear Information System (INIS)

    Hippel, David von; Suzuki, Tatsujiro; Williams, James H.; Savage, Timothy; Hayes, Peter

    2011-01-01

    'Energy Security' has typically, to those involved in making energy policy, meant mostly securing access to oil and other fossil fuels. With increasingly global, diverse energy markets, however, and increasingly transnational problems resulting from energy transformation and use, old energy security rationales are less salient, and other issues, including climate change and other environmental, economic, and international considerations are becoming increasingly important. As a consequence, a more comprehensive operating definition of 'Energy Security' is needed, along with a workable framework for analysis of which future energy paths or scenarios are likely to yield greater Energy Security in a broader, more comprehensive sense. Work done as a part of the Nautilus Institute's 'Pacific Asia Regional Energy Security' (PARES) project developed a broader definition of Energy Security, and described an analytical framework designed to help to compare the energy security characteristics - both positive and negative - of different quantitative energy paths as developed using software tools such as the LEAP (Long-range Energy Alternatives Planning) system.

  1. Adolescents, pregnancy, and mental health.

    Science.gov (United States)

    Siegel, Rebecca S; Brandon, Anna R

    2014-06-01

    Pregnancy during adolescence is a risk factor for adverse medical and psychosocial outcomes, including psychiatric illness. Psychiatric illness is linked with obstetric complications along with impaired maternal functioning in the postpartum period. This article provides a comprehensive review of the research examining the intersection of psychopathology and adolescent pregnancy and the postpartum period. A literature search was conducted using PubMed (Medline), PsycINFO, and CINAHL for articles published between 1990 and 2013 that examined depression, anxiety, bipolar disorder, and psychosis during pregnancy and the postpartum period in adolescents age 21 years or younger. Articles were selected that covered the following topics: Prevalence or incidence, comorbidity, psychosocial correlates, birth outcomes, parenting, child outcomes, and psychosocial treatment. Forty articles were found and reviewed. There is a substantial research base examining self-reported depressive symptoms in adolescents during pregnancy and the postpartum period. Existing research suggests that pregnant and parenting adolescents are at greater risk for experiencing depressive symptoms than pregnant and postpartum adult women. Depression in the perinatal period is also a risk factor for substance and alcohol abuse and a harsher parenting style in adolescents. Areas for future research in this population include investigating the prevalence, psychosocial correlates, and outcomes of clinically diagnosed Major Depressive Disorder, developing and empirically validating psychotherapeutic treatments, and focusing upon other psychiatric diagnoses such as bipolar disorder, anxiety, and psychosis. Copyright © 2014 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  2. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  3. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  4. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  5. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  6. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  7. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  8. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  9. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  10. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  11. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  12. [Adolescent psychosocial development].

    Science.gov (United States)

    Gaete, Verónica

    2015-01-01

    It is increasingly necessary that pediatricians have greater knowledge of adolescent health. To begin with they should be familiar with the psychosocial development of this period, an issue which is imperative for the health care of the age group. With that purpose, this article reviews the normal adolescent psychosocial development. Adolescence is a stage that has been progressively prolonged, during which fast and big changes occur, that lead human beings to become biologically, psychologically and socially mature, and potentially able to live independently. Developmental tasks of this period are the establishment of identity and the achievement of autonomy. Although it is a process of high individual variability in terms of its beginning and end, the progression through stages, the synchrony of development between the various areas, and in other aspects, the psychosocial development of this period usually have common characteristics and a progressive pattern of 3 phases: early, middle and late adolescence. Psychological, cognitive, social, sexual and moral development of young people in each of them are described in this article. Copyright © 2015 Sociedad Chilena de Pediatría. Publicado por Elsevier España, S.L.U. All rights reserved.

  13. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  14. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  15. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  16. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  17. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  18. Media multitasking in adolescence.

    Science.gov (United States)

    Cain, Matthew S; Leonard, Julia A; Gabrieli, John D E; Finn, Amy S

    2016-12-01

    Media use has been on the rise in adolescents overall, and in particular, the amount of media multitasking-multiple media consumed simultaneously, such as having a text message conversation while watching TV-has been increasing. In adults, heavy media multitasking has been linked with poorer performance on a number of laboratory measures of cognition, but no relationship has yet been established between media-multitasking behavior and real-world outcomes. Examining individual differences across a group of adolescents, we found that more frequent media multitasking in daily life was associated with poorer performance on statewide standardized achievement tests of math and English in the classroom, poorer performance on behavioral measures of executive function (working memory capacity) in the laboratory, and traits of greater impulsivity and lesser growth mindset. Greater media multitasking had a relatively circumscribed set of associations, and was not related to behavioral measures of cognitive processing speed, implicit learning, or manual dexterity, or to traits of grit and conscientiousness. Thus, individual differences in adolescent media multitasking were related to specific differences in executive function and in performance on real-world academic achievement measures: More media multitasking was associated with poorer executive function ability, worse academic achievement, and a reduced growth mindset.

  19. Adolescent Abuse.

    Science.gov (United States)

    Foreman, Susan; Seligman, Linda

    1983-01-01

    Discusses legal and developmental aspects of adolescent abuse, as distinguished from child abuse. The role of the school counselor in identifying and counseling abused adolescents and their families is discussed and several forms of intervention and support services are described. (JAC)

  20. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  1. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  2. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  3. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  4. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  5. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  6. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  7. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  8. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  9. Turkey as a U.S. Security Partner

    National Research Council Canada - National Science Library

    Larrabee, F. S

    2008-01-01

    .... Now, however, trends in the greater Middle East, in Turkish security policies, and within Turkish society itself appear to be eroding the commonality of interests that constitutes the foundation of that partnership...

  10. Improving Food and Nutrition Security in the Philippines through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...

  11. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  12. Job Security, Technical Innovation and Productivity

    Science.gov (United States)

    Peters, E. Bruce

    1978-01-01

    Analyzes both the management practices of Robert Owen during the early 1800's and current examples of management practices to provide insight into the questions of what bars adoption of better technology and what is the key to greater organizational flexibility and productivity; concludes that ensuring job security at the management level would…

  13. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  14. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  15. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  16. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  17. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  18. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  19. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  20. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  1. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  2. Deviance and resistance: Malaria elimination in the greater Mekong subregion.

    Science.gov (United States)

    Lyttleton, Chris

    2016-02-01

    Malaria elimination rather than control is increasingly globally endorsed, requiring new approaches wherein success is not measured by timely treatment of presenting cases but eradicating all presence of infection. This shift has gained urgency as resistance to artemisinin-combination therapies spreads in the Greater Mekong Sub-region (GMS) posing a threat to global health security. In the GMS, endemic malaria persists in forested border areas and elimination will require calibrated approaches to remove remaining pockets of residual infection. A new public health strategy called 'positive deviance' is being used to improve health promotion and community outreach in some of these zones. However, outbreaks sparked by alternative understandings of appropriate behaviour expose the unpredictable nature of 'border malaria' and difficulties eradication faces. Using a recent spike in infections allegedly linked to luxury timber trade in Thai borderlands, this article suggests that opportunities for market engagement can cause people to see 'deviance' as a means to material advancement in ways that increase disease vulnerability. A malaria outbreak in Ubon Ratchathani was investigated during two-week field-visit in November 2014 as part of longer project researching border malaria in Thai provinces. Qualitative data were collected in four villages in Ubon's three most-affected districts. Discussions with villagers focused primarily on changing livelihoods, experience with malaria, and rosewood cutting. Informants included ten men and two women who had recently overnighted in the nearby forest. Data from health officials and villagers are used to frame Ubon's rise in malaria transmission within moral and behavioural responses to expanding commodity supply-chains. The article argues that elimination strategies in the GMS must contend with volatile outbreaks among border populations wherein 'infectiousness' and 'resistance' are not simply pathogen characteristics but also

  3. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    Science.gov (United States)

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  4. An Overview of Economic Approaches to Information Security Management

    NARCIS (Netherlands)

    Su, X.

    The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in

  5. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  6. No safe place: parental alcoholism and adolescent suicide.

    Science.gov (United States)

    Meyer, D C; Phillips, W M

    1990-10-01

    A child growing up in an alcoholic home develops either little self-consolidation (I-ness) and efficacy (I can) or a distorted self (I am insignificant). This results in a desperate search for a soothing-object (We-ness). The sadomasochistic behaviors, which a youth witnesses and is subjected to, become internalized as survival skills, but ultimately fail. These factors set the stage for a destructive modus operandi. When there is peer group attachment pressure, this teen does not find security when questioning, "Who am I?" because there is no "I" and no "We". Instead, this adolescent experiences fear, anxiety, and range, and wonders, "What's going to happen to me?" This propels the youth into frantic behaviors that are meant to confirm a sense of "We-ness" and competence. The result, however, is greater frustration and a mirroring of the opposite. Also, since there is a diminutive capacity for trust and an exiguous chance to reach out or respond to significant others, external soothingness becomes unobtainable. When the adolescent is confronted with aloneness, helplessness, and hopelessness, desperation results and a search for a safe place ensues. Suicide holds such an illusion. It is the embodiment of sadomasochism and permits the cognition "I am capable." A case study illustrates the problems.

  7. Association between food and nutrition insecurity with cardiometabolic risk factors in childhood and adolescence: a systematic review

    Directory of Open Access Journals (Sweden)

    Naruna Pereira Rocha

    2016-06-01

    Full Text Available Abstract Objective: To address the association between food and nutrition insecurity and cardiometabolic risk factors in childhood and adolescence. Data source: Articles were selected from the Medline, Lilacs and SciELO databases with no publication date limit, involving children and adolescents, using the descriptors: food and nutrition security, diabetes mellitus, hypertension, metabolic syndrome, stress and dyslipidemia. The terms were used in Portuguese, English and Spanish. The search was carried out systematically and independently by two reviewers. Data synthesis: Exposure to food insecurity during childhood and adolescence ranged from 3.3% to 82% in the selected publications. Exposure to food insecurity was associated with stress, anxiety, greater chance of hospitalization, nutritional deficiencies, excess weight and inadequate diets with reduced intake of fruits and vegetables and increased consumption of refined carbohydrates and fats. Conclusions: Food and nutrition insecurity was associated with the presence of cardiometabolic risk factors in the assessed publications. Childhood and adolescence constitute a period of life that is vulnerable to food insecurity consequences, making it extremely important to ensure the regular and permanent access to food. Because this is a complex association, some difficulties are found, such as the synergy between risk factors, the assessment of heterogeneous groups and extrapolation of data to other populations, in addition to the influence of environmental factors.

  8. [Association between food and nutrition insecurity with cardiometabolic risk factors in childhood and adolescence: a systematic review].

    Science.gov (United States)

    Rocha, Naruna Pereira; Milagres, Luana Cupertino; Novaes, Juliana Farias de; Franceschini, Sylvia do Carmo Castro

    2016-06-01

    To address the association between food and nutrition insecurity and cardiometabolic risk factors in childhood and adolescence. Articles were selected from the Medline, Lilacs and SciELO databases with no publication date limit, involving children and adolescents, using the descriptors: food and nutrition security, diabetes mellitus, hypertension, metabolic syndrome, stress and dyslipidemia. The terms were used in Portuguese, English and Spanish. The search was carried out systematically and independently by two reviewers. Exposure to food insecurity during childhood and adolescence ranged from 3.3% to 82% in the selected publications. Exposure to food insecurity was associated with stress, anxiety, greater chance of hospitalization, nutritional deficiencies, excess weight and inadequate diets with reduced intake of fruits and vegetables and increased consumption of refined carbohydrates and fats. Food and nutrition insecurity was associated with the presence of cardiometabolic risk factors in the assessed publications. Childhood and adolescence constitute a period of life that is vulnerable to food insecurity consequences, making it extremely important to ensure the regular and permanent access to food. Because this is a complex association, some difficulties are found, such as the synergy between risk factors, the assessment of heterogeneous groups and extrapolation of data to other populations, in addition to the influence of environmental factors. Copyright © 2015 Sociedade de Pediatria de São Paulo. Publicado por Elsevier Editora Ltda. All rights reserved.

  9. Enhanced striatal sensitivity to aversive reinforcement in adolescents versus adults.

    Science.gov (United States)

    Galván, Adriana; McGlennen, Kristine M

    2013-02-01

    Neurodevelopmental changes in mesolimbic regions are associated with adolescent risk-taking behavior. Numerous studies have shown exaggerated activation in the striatum in adolescents compared with children and adults during reward processing. However, striatal sensitivity to aversion remains elusive. Given the important role of the striatum in tracking both appetitive and aversive events, addressing this question is critical to understanding adolescent decision-making, as both positive and negative factors contribute to this behavior. In this study, human adult and adolescent participants performed a task in which they received squirts of appetitive or aversive liquid while undergoing fMRI, a novel approach in human adolescents. Compared with adults, adolescents showed greater behavioral and striatal sensitivity to both appetitive and aversive stimuli, an effect that was exaggerated in response to delivery of the aversive stimulus. Collectively, these findings contribute to understanding how neural responses to positive and negative outcomes differ between adolescents and adults and how they may influence adolescent behavior.

  10. Who seeks bariatric surgery? Psychosocial functioning among adolescent candidates, other treatment-seeking adolescents with obesity and healthy controls.

    Science.gov (United States)

    Call, C C; Devlin, M J; Fennoy, I; Zitsman, J L; Walsh, B T; Sysko, R

    2017-12-01

    Limited data are available on the characteristics of adolescents with obesity who seek bariatric surgery. Existing data suggest that adolescent surgery candidates have a higher body mass index (BMI) than comparison adolescents with obesity, but the limited findings regarding psychosocial functioning are mixed. This study aimed to compare BMI and psychosocial functioning among adolescent bariatric surgery candidates, outpatient medical-treatment-seeking adolescents with obesity (receiving lifestyle modification), and adolescents in the normal-weight range. All adolescents completed self-report measures of impulsivity, delay discounting, depression, anxiety, stress, eating pathology, family functioning and quality of life, and had their height and weight measured. Adolescent surgical candidates had higher BMIs than both comparison groups. Surgical candidates did not differ from medical-treatment-seeking adolescents with obesity on any measure of psychosocial functioning, but both groups of adolescents with obesity reported greater anxiety and eating pathology and poorer quality of life than normal-weight adolescents. Quality of life no longer differed across groups after controlling for BMI, suggesting that it is highly related to weight status. Adolescents with obesity may experience greater anxiety, eating pathology, and quality of life impairments than their peers in the normal-weight range regardless of whether they are seeking surgery or outpatient medical treatment. Clinical implications and directions for future research are discussed. © 2017 World Obesity Federation.

  11. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  12. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  13. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  14. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  15. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  16. Implementing healthcare information security: standards can help.

    Science.gov (United States)

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  17. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  18. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  19. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  20. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  1. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  2. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  3. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  4. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  5. Adolescent Idiopathic Scoliosis

    Science.gov (United States)

    ... Radiation Exposure in Scoliosis Kyphosis Adolescent Back Pain Spondylolysis For Adolescents For Adults Common Questions & Glossary Resources ... Radiation Exposure in Scoliosis Kyphosis Adolescent Back Pain Spondylolysis For Adolescents For Adults Juvenile Idiopathic Scoliosis Diagnosed ...

  6. How to Establish Security Awareness in Schools

    Science.gov (United States)

    Beyer, Anja; Westendorf, Christiane

    The internet is a fast changing medium and comprises several websites fraught with risk. In this context especially young age groups are endangered. They have less experience using the media and little knowledge on existing internet risks. There are a number of initiatives, which are engaged in the topic of internet safety. They provide information about measures on how to prevent and to deal with internet risks. However it is not certain if these initiatives do reach their target group (children and adolescents). In this regard schools bear a special relevance, since they have the knowledge about didactic methods and the chance to address measures directly to children and adolescents. The authors of this paper provide an overview of current security education in German schools, problems and open questions. Finally the authors make recommendations on how to establish internet safety in schools.

  7. [Human papillomavirus infection and adolescence].

    Science.gov (United States)

    Sam Soto, Selene; de la Peña y Carranza, Alejandro Ortiz; Plascencia, Josefina Lira

    2011-04-01

    Infection with human papillomavirus has increased dramatically in recent years. The highest prevalence rates are among adolescents and young women, reflecting changes in sexual behavior associated with biological factors in adolescent development. Adolescents who begin sexual activity early are at greater risk of precursor lesions and cervical cancer. There are adolescents with special circumstances, where no early decision should be delayed cervical cytology and in whom it is important to initiate consultations and periodic reviews with a preventive approach. Cervical cancer can be avoided when the diagnosis and treatment of precursor lesions is early. Despite efforts at sex education based on "safe sex" with the correct use of condoms has not been able to reduce the incidence of infections with human papillomavirus in adolescents. While better than nothing, condom use is not 100% reliable. Studies show that consistent and correct use provides protection against the human papillomavirus only 70%. In Mexico, reported an overall ratio of actual use of condoms from 24.6%. It is clear that the physician who provides care for adolescents plays a fundamental role in sex education. The key to future prevention of cervical cancer and its precursor lesions could be the vaccination.

  8. Security of water treatment facilities

    Energy Technology Data Exchange (ETDEWEB)

    Forsha, C.A. [Univ. of Pittsburgh at Johnstown, Johnstowne, PA (United States)

    2002-06-15

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  9. Security of water treatment facilities

    International Nuclear Information System (INIS)

    Forsha, C.A.

    2002-01-01

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  10. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  11. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  12. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  13. Altered Developmental Trajectories for Impulsivity and Sensation Seeking among Adolescent Substance Users

    Science.gov (United States)

    Charles, Nora E.; Ryan, Stacy R.; Bray, Bethany C.; Mathias, Charles W.; Acheson, Ashley; Dougherty, Donald M.

    2016-01-01

    A number of studies have associated impulsivity and sensation seeking with level of substance use and risk for developing a substance use disorder. These relationships may be particularly apparent during adolescence, when developmental changes in impulsivity and sensation seeking occur at the same time as increased opportunities for substance use. To examine this, the current study measured impulsivity and sensation seeking from pre-adolescence to mid-adolescence in a sample of youth, the majority of whom were identified as being at risk for developing a substance use disorder based on their family history of substance use disorders. Youth were separated into those who did (n = 117) and did not (n = 269) initiate substance use by mid-adolescence. Results showed that substance users were more impulsive and more sensation seeking during pre-adolescence, prior to any significant substance use, and that greater sensation seeking in pre-adolescence was related to heavier substance use by mid-adolescence. In addition, developmental trajectories for substance-using youth showed a greater increase in sensation seeking but a more modest decrease in impulsivity from pre-adolescence to mid-adolescence. Taken together, these results indicate that increased impulsivity and sensation seeking is apparent in adolescent substance users as early as pre-adolescence, that the difference between substance users and non-users becomes larger across early adolescence as their developmental trajectories diverge, and that greater sensation seeking in pre-adolescence may predict increased substance use by mid-adolescence. PMID:27174219

  14. Adolescent Gynecomastia.

    Science.gov (United States)

    Guss, Carly E; Divasta, Amy D

    2017-06-01

    Gynecomastia, defined as the presence of glandular breast tissue in men, is a common, typically benign physical exam finding during adolescence. Although the exact pathogenesis of gynecomastia is unknown, it is likely due to a hormonal imbalance between estrogens and androgens. Most cases are idiopathic and do not require further evaluation if the history and physical examination are reassuring. Although the majority of cases will resolve spontaneously, surgical correction may be an option for adolescents with persistent and problematic gynecomastia. Gynecomastia can have significant negative impact on one's self-esteem, and it is crucial that primary care providers screen adolescents with gynecomastia for mental health concerns. Future studies are necessary to elucidate the true incidence and prevalence of gynecomastia in adolescent males, and to further investigate the short-term and long-term physical and emotional effects of gynecomastia. Copyright© of YS Medical Media ltd.

  15. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  16. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  17. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  18. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  19. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  20. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  1. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  2. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  3. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  4. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  5. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  6. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  7. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  8. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  9. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  10. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  11. Romantic relationships and psychological distress among adolescents: Moderating role of friendship closeness.

    Science.gov (United States)

    Chow, Chong Man; Ruhl, Holly; Buhrmester, Duane

    2015-11-01

    The formation of romantic relationships and friendships in adolescence is a defining milestone in the progression toward social maturity. Thus, examining adolescents' friendship and romantic experiences serves a vital role in understanding their psychological adjustment. The main purposes of the current study were to examine (a) whether romantic involvement, romantic security, and friendship closeness were independently predictive of late adolescents' depression and loneliness, and (b) whether friendship closeness would moderate the negative effects of adolescents' lower degrees of romantic involvement and romantic security on depression and loneliness. Data came from 12th grade adolescents (N = 110, 53 females) as well as their parents and a same-sex best friend. Adolescents reported on their romantic involvement, romantic security, and psychological distress. Parent reports of adolescents' depressive symptoms and friend reports of friendship closeness were also included. Higher degrees of romantic involvement and friendship closeness were related to lower degrees of loneliness. Higher degrees of romantic security were related to lower degrees of depression and loneliness. The effect of romantic involvement on depression and loneliness was moderated by friendship closeness. Also, the effect of romantic security on loneliness was moderated by friendship closeness. Future research should focus on the interactive roles that friendships and romantic relationships play in the emergence of psychopathology during adolescence. © The Author(s) 2015.

  12. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  13. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  14. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  15. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  16. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  17. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  18. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  19. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  20. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  2. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  3. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  4. Adolescents' aggression to parents: longitudinal links with parents' physical aggression.

    Science.gov (United States)

    Margolin, Gayla; Baucom, Brian R

    2014-11-01

    To investigate whether parents' previous physical aggression (PPA) exhibited during early adolescence is associated with adolescents' subsequent parent-directed aggression even beyond parents' concurrent physical aggression (CPA) and to investigate whether adolescents' emotion dysregulation and attitudes condoning child-to-parent aggression moderate associations. Adolescents (N = 93) and their parents participated in a prospective longitudinal study. Adolescents and parents reported at waves 1-3 on four types of parents' PPA (mother to adolescent, father to adolescent, mother to father, and father to mother). Wave 3 assessments also included adolescents' emotion dysregulation, attitudes condoning aggression, and externalizing behaviors. At waves 4 and 5, adolescents and parents reported on adolescents' parent-directed physical aggression, property damage, and verbal aggression and on parents' CPA. Parents' PPA emerged as a significant indicator of adolescents' parent-directed physical aggression (odds ratio [OR]: 1.25, 95% confidence interval [CI]: 1.0-1.55; p = .047), property damage (OR: 1.29, 95% CI: 1.1-1.5, p = .002), and verbal aggression (OR: 1.35, 95% CI: 1.15-1.6, p controlling for adolescents' sex, externalizing behaviors, and family income. When controlling for parents' CPA, previous mother-to-adolescent aggression still predicted adolescents' parent-directed physical aggression (OR: 5.56, 95% CI: 1.82-17.0, p = .003), and father-to-mother aggression predicted adolescents' parent-directed verbal aggression (OR: 1.86, 95% CI: 1.0-3.3, p = .036). Emotion dysregulation and attitudes condoning aggression did not produce direct or moderated the effects. Adolescents' parent-directed aggression deserves greater attention in discourse about lasting, adverse effects of even minor forms of parents' physical aggression. Future research should investigate parent-directed aggression as an early signal of aggression into adulthood. Copyright © 2014 Society for

  5. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  6. Are They Listening? Parental Social Coaching and Parenting Emotional Climate Predict Adolescent Receptivity.

    Science.gov (United States)

    Gregson, Kim D; Erath, Stephen A; Pettit, Gregory S; Tu, Kelly M

    2016-12-01

    Associations linking parenting emotional climate and quality of parental social coaching with young adolescents' receptivity to parental social coaching were examined (N = 80). Parenting emotional climate was assessed with adolescent-reported parental warmth and hostility. Quality of parental social coaching (i.e., prosocial advice, benign framing) was assessed via parent-report and behavioral observations during a parent-adolescent discussion about negative peer evaluation. An adolescent receptivity latent variable score was derived from observations of adolescents' behavior during the discussion, change in adolescents' peer response plan following the discussion, and adolescent-reported tendency to seek social advice from the parent. Parenting climate moderated associations between coaching and receptivity: Higher quality coaching was associated with greater receptivity in the context of a more positive climate. Analyses suggested a stronger association between coaching and receptivity among younger compared to older adolescents. © 2015 The Authors. Journal of Research on Adolescence © 2015 Society for Research on Adolescence.

  7. Sexuality and reproduction: implications in the process of healthy adolescence

    Directory of Open Access Journals (Sweden)

    Adelita Campos Araújo

    2012-06-01

    Full Text Available This study aimed to understand the perceptions of adolescents about their process of healthy adolescence with regard to sexuality and reproduction. This is a qualitative research of exploratory type, involving 10 teenagers, in a state school in southern Rio Grande do Sul, between August and October 2007. To collect the data, were used semi-structured interviews, whose contents were subjected to thematic analysis, emerging the theme: sexuality and reproduction in adolescence. At the data, it was noticed the need to provide more guidelines to a healthy adolescence, in the sense of strengthening and promoting the necessary security for the exercise of adolescent sexuality and reproduction. It also showed the need to prepare the adolescent by professionals of health, of education or the family, to face some situations, such as: unwanted pregnancy, first sexual intercourse, self-medication, fear of talking to parents about sexuality and reproduction, among others.

  8. Indicators of energy security in industrialised countries

    International Nuclear Information System (INIS)

    Loeschel, Andreas; Moslener, Ulf; Ruebbelke, Dirk T.G.

    2010-01-01

    Energy security has become a popular catch phrase, both in the scientific arena as well as in the political discussion. Yet, in general the applied concepts of energy security are rather vague. This paper sheds some light on concepts and indicators of energy security. First, we conceptually discuss the issue of energy supply security and explain why it is not to handle by one science alone and what economics may contribute in order to structure the topic. After providing a brief survey of existing attempts to define or measure energy security we suggest an additional dimension along which indicators of energy security may be classified: ex-post and ex-ante indicators. Finally, we illustrate our concept on the basis of several simplified indicators. While ex-post indicators are mostly based on price developments, ex-ante indicators are to a greater extent aimed at illustrating potential problems. Our illustration suggests that it is worthwhile to take into account the market structure along with the political stability of exporting countries. (author)

  9. Adolescent self-harm and risk factors.

    Science.gov (United States)

    Zhang, Jixiang; Song, Jianwei; Wang, Jing

    2016-12-01

    This study aims to define the characteristics of adolescents who have engaged in self-harm behavior and ascertain the risk factors. From January 2013 to January 2014, 4,176 adolescents from senior middle schools in Linyi, China, were administered four questionnaire surveys to ascertain the following: incidence of self-harm behavior regarding the frequency of different self-harm behaviors by group (never/one to five times/greater than five times in the last 6 months) and then comparing the self-harm behavior of the different subgroups; symptom self-check, comparing the differences between the adolescents with self-harm behavior and without in nine subscales (somatization, obsessive-compulsive symptoms, interpersonal sensitivity, depression, anxiety, hostility, fear, paranoid, and psychosis); Adolescent Self-Rating Life Events Check List scores; and Egna Minnenav Barndoms Uppfostran (EMBU) scores. Multivariate logistic regression analysis was used to determine the risk factors of self-harm in adolescents. The incidence of adolescent self-harm was 27.60%; the occurrence of adolescent self-harm was closely related to their mental health status, stressful life events, and EMBU. Being female, an urban student, or an only child; having poor school performance or experiences of stressful life events, harsh parenting styles, or excessive interference; and poor mental health were the risk factors for adolescent self-harm. The incidence of adolescent self-harm was high, and their mental health status, stressful life events, and EMBU affected the occurrence of adolescent self-harm, which is an issue that needs greater attention. © 2016 John Wiley & Sons Australia, Ltd.

  10. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  11. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  12. Inhibitory Control Mediates the Association between Perceived Stress and Secure Relationship Quality.

    Science.gov (United States)

    Herd, Toria; Li, Mengjiao; Maciejewski, Dominique; Lee, Jacob; Deater-Deckard, Kirby; King-Casas, Brooks; Kim-Spoon, Jungmeen

    2018-01-01

    Past research has demonstrated negative associations between exposure to stressors and quality of interpersonal relationships among children and adolescents. Nevertheless, underlying mechanisms of this association remain unclear. Chronic stress has been shown to disrupt prefrontal functioning in the brain, including inhibitory control abilities, and evidence is accumulating that inhibitory control may play an important role in secure interpersonal relationship quality, including peer problems and social competence. In this prospective longitudinal study, we examine whether changes in inhibitory control, measured at both behavioral and neural levels, mediate the association between stress and changes in secure relationship quality with parents and peers. The sample included 167 adolescents (53% males) who were first recruited at age 13 or 14 years and assessed annually three times. Adolescents' inhibitory control was measured by their behavioral performance and brain activities, and adolescents self-reported perceived stress levels and relationship quality with mothers, fathers, and peers. Results suggest that behavioral inhibitory control mediates the association between perceived stress and adolescent's secure relationship quality with their mothers and fathers, but not their peers. In contrast, given that stress was not significantly correlated with neural inhibitory control, we did not further test the mediation path. Our results highlight the role of inhibitory control as a process through which stressful life experiences are related to impaired secure relationship quality between adolescents and their mothers and fathers.

  13. Stress and Coping with Stress in Adolescence

    Directory of Open Access Journals (Sweden)

    Petra Dolenc

    2015-12-01

    Full Text Available Because of the many developmental changes in adolescence, young people are exposed to greater likelihood of experiencing stress. On the other hand, this period is critical for developing effective and constructive coping strategies. In the contribution, we summarize part of what is known about stress, stress responses and coping. Throughout, we focus on common stressful events among adolescents and emphasize the importance of dealing successfully with stressors in their daily lives. Finally, we highlight the most frequently used instruments to measure coping behaviour in youth and present an overview of the research findings on differences in coping among adolescents according to age and gender.

  14. Daily Spiritual Experiences and Adolescent Treatment Response

    Science.gov (United States)

    LEE, MATTHEW T.; VETA, PAIGE S.; JOHNSON, BYRON R.; PAGANO, MARIA E.

    2014-01-01

    The purpose of this study is to explore changes in belief orientation during treatment and the impact of increased daily spiritual experiences (DSE) on adolescent treatment response. One-hundred ninety-five adolescents court-referred to a 2-month residential treatment program were assessed at intake and discharge. Forty percent of youth who entered treatment as agnostic or atheist identified themselves as spiritual or religious at discharge. Increased DSE was associated with greater likelihood of abstinence, increased prosocial behaviors, and reduced narcissistic behaviors. Results indicate a shift in DSE that improves youth self-care and care for others that may inform intervention approaches for adolescents with addiction. PMID:25525291

  15. Daily Spiritual Experiences and Adolescent Treatment Response.

    Science.gov (United States)

    Lee, Matthew T; Veta, Paige S; Johnson, Byron R; Pagano, Maria E

    2014-04-01

    The purpose of this study is to explore changes in belief orientation during treatment and the impact of increased daily spiritual experiences (DSE) on adolescent treatment response. One-hundred ninety-five adolescents court-referred to a 2-month residential treatment program were assessed at intake and discharge. Forty percent of youth who entered treatment as agnostic or atheist identified themselves as spiritual or religious at discharge. Increased DSE was associated with greater likelihood of abstinence, increased prosocial behaviors, and reduced narcissistic behaviors. Results indicate a shift in DSE that improves youth self-care and care for others that may inform intervention approaches for adolescents with addiction.

  16. Implications of Marijuana Legalization for Adolescent Substance Use

    OpenAIRE

    Hopfer, Christian

    2014-01-01

    Marijuana that is legally available for adults has multiple implications for adolescent substance use. One potential effect that legalization may have is an increase in adolescent use to due increased availability, greater social acceptance, and possibly lower prices. Legalization may also facilitate the introduction of new formulations of marijuana (edible, vaporized) and with potentially higher potencies. It is unknown what adolescent consumption patterns will be if marijuana is widely avai...

  17. Prosocial reward learning in children and adolescents

    Directory of Open Access Journals (Sweden)

    Youngbin Kwak

    2016-10-01

    Full Text Available Adolescence is a period of increased sensitivity to social contexts. To evaluate how social context sensitivity changes over development – and influences reward learning – we investigated how children and adolescents perceive and integrate rewards for oneself and others during a dynamic risky-decision-making task. Children and adolescents (N=75, 8-16 yrs performed the Social Gambling Task (SGT, (Kwak et al., 2014 and completed a set of questionnaires measuring other-regarding behavior. In the SGT, participants choose amongst four card decks that have different payout structures for oneself and for a charity. We examined patterns of choices, overall decision strategies, and how reward outcomes led to trial-by-trial adjustments in behavior, as estimated using a reinforcement-learning model. Performance of children and adolescents was compared to data from a previously collected sample of adults (N=102 performing the identical task. We found that that children/adolescents were not only more sensitive to rewards directed to the charity than self but also showed greater prosocial tendencies on independent measures of other-regarding behavior. Children and adolescents also showed less use of a strategy that prioritizes rewards for self at the expense of rewards for others. These results support the conclusion that, compared to adults, children and adolescents show greater sensitivity to outcomes for others when making decisions and learning about potential rewards.

  18. Critical Thinking about Fables: Examining Language Production and Comprehension in Adolescents

    Science.gov (United States)

    Nippold, Marilyn A.; Frantz-Kaspar, Megan W.; Cramond, Paige M.; Kirk, Cecilia; Hayward-Mayhew, Christine; MacKinnon, Melanie

    2015-01-01

    Purpose: This study was designed primarily to determine if a critical-thinking task involving fables would elicit greater syntactic complexity than a conversational task in adolescents. Another purpose was to determine how well adolescents understand critical-thinking questions about fables. Method: Forty adolescents (N = 20 boys and 20 girls;…

  19. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  20. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  1. Mother, father, and adolescent self-control and adherence in adolescents with Type 1 diabetes.

    Science.gov (United States)

    Lansing, Amy Hughes; Crochiere, Rebecca; Cueto, Carrie; Wiebe, Deborah J; Berg, Cynthia A

    2017-06-01

    This study explored whether shared self-control across a family system, including adolescent, mother, and father self-control, as well as the interaction of mother and father self-control, was associated with ease of completing adherence tasks and the completion of adherence behaviors related to the Type 1 diabetes (T1D) regimen. One hundred thirty-seven adolescents (M = 13.48 years), mothers, and fathers completed a self-report measure of self-control, while adolescents also self-reported on ease of completing adherence tasks and the frequency with which they completed adherence tasks. Higher adolescent, mother, father, and the interaction of mother and father self-control were each associated with greater adolescent perceptions of ease of completing adherence tasks. Also, greater adolescent perception of ease of adherence mediated the association of higher adolescent, father, and the interaction of mother and father self-control on more frequent adherence behaviors. The results are consistent with the idea that family members may share the load of self-control within the family system. The results point to the importance of assessing and intervening within the entire family system to support improved quality of life and better adherence to the medical regimen in adolescents with Type 1 diabetes. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Parental influence on substance use in adolescent social networks.

    Science.gov (United States)

    Shakya, Holly B; Christakis, Nicholas A; Fowler, James H

    2012-12-01

    To evaluate the relationship between the parenting style of an adolescent's peers' parents and an adolescent's substance use. Longitudinal survey. Adolescents across the United States were interviewed at school and at home. Nationally representative sample of adolescents in the United States. Authoritative vs neglectful parenting style of adolescent's parents and adolescent's friends' parents and adolescent substance use. Adolescent alcohol abuse, smoking, marijuana use, and binge drinking. If an adolescent had a friend whose mother was authoritative, that adolescent was 40% (95% CI, 12%-58%) less likely to drink to the point of drunkenness, 38% (95% CI, 5%-59%) less likely to binge drink, 39% (95% CI, 12%-58%) less likely to smoke cigarettes, and 43% (95% CI, 1%-67%) less likely to use marijuana than an adolescent whose friend's mother was neglectful, controlling for the parenting style of the adolescent's own mother, school-level fixed effects, and demographics. These results were only partially mediated by peer substance use. Social network influences may extend beyond the homogeneous dimensions of own peer or own parent to include extradyadic influences of the wider network. The value of parenting interventions should be reassessed to take into account these spillover effects in the greater network.

  3. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  4. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  5. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  6. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  7. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  8. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  9. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  10. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  11. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  12. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  13. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  14. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  15. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  16. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  17. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  18. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  19. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  20. The secure heating reactor

    International Nuclear Information System (INIS)

    Pind, C.

    1987-01-01

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories

  1. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  2. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  3. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  4. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  5. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  6. The Effect of Family Communication Patterns on Adopted Adolescent Adjustment

    Science.gov (United States)

    Rueter, Martha A.; Koerner, Ascan F.

    2008-01-01

    Adoption and family communication both affect adolescent adjustment. We proposed that adoption status and family communication interact such that adopted adolescents in families with certain communication patterns are at greater risk for adjustment problems. We tested this hypothesis using a community-based sample of 384 adoptive and 208…

  7. Subtyping adolescents with bulimia nervosa.

    Science.gov (United States)

    Chen, Eunice Y; Le Grange, Daniel

    2007-12-01

    Cluster analyses of eating disorder patients have yielded a "dietary-depressive" subtype, typified by greater negative affect, and a "dietary" subtype, typified by dietary restraint. This study aimed to replicate these findings in an adolescent sample with bulimia nervosa (BN) from a randomized controlled trial and to examine the validity and reliability of this methodology. In the sample of BN adolescents (N=80), cluster analysis revealed a "dietary-depressive" subtype (37.5%) and a "dietary" subtype (62.5%) using the Beck Depression Inventory, Rosenberg Self-Esteem Scale and Eating Disorder Examination Restraint subscale. The "dietary-depressive" subtype compared to the "dietary" subtype was significantly more likely to: (1) report co-occurring disorders, (2) greater eating and weight concerns, and (3) less vomiting abstinence at post-treatment (all p'sreliability of the subtyping scheme, a larger sample of adolescents with mixed eating and weight disorders in an outpatient eating disorder clinic (N=149) was subtyped, yielding similar subtypes. These results support the validity and reliability of the subtyping strategy in two adolescent samples.

  8. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  9. 76 FR 8946 - Security Ratings

    Science.gov (United States)

    2011-02-16

    ... grade securities (such as foreign currency or other cash settled derivative securities). See... investment grade securities (such as foreign currency or other cash settled derivative securities). See... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No...

  10. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  11. Quantum secure communication models comparison

    Directory of Open Access Journals (Sweden)

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.

  12. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  13. A review of attachment theory in the context of adolescent parenting.

    Science.gov (United States)

    Flaherty, Serena Cherry; Sadler, Lois S

    2011-01-01

    The purpose of this article is to review attachment theory and relate the attachment perspective to adolescent mothers and their children. Attachment theory explains positive maternal-infant attachment as a dyadic relationship between the infant and mother that provides the infant with a secure base from which to explore the world. With respect to cognitive, social, and behavioral domains, securely attached infants tend to have more favorable long-term outcomes, while insecurely attached infants are more likely to have adverse outcomes. Adolescent parenthood can disrupt normal adolescent development, and this disruption influences development of the emotional and cognitive capacities necessary for maternal behaviors that foster secure attachment. However, it appears that if specialized supports are in place to facilitate the process of developing attachment, infants of adolescent mothers can obtain higher rates of secure attachment than normative samples in this population. Copyright © 2011 National Association of Pediatric Nurse Practitioners. Published by Mosby, Inc. All rights reserved.

  14. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  15. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  16. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2018-03-01

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  17. Musculoskeletal pain in obese adolescents.

    Science.gov (United States)

    Jannini, Suely Nóbrega; Dória-Filho, Ulysses; Damiani, Durval; Silva, Clovis Artur Almeida

    2011-01-01

    To determine the prevalence of pain, musculoskeletal syndromes, orthopedic disorders and using computers and playing videogames among obese adolescents. This was a cross-sectional study that investigated 100 consecutive obese adolescents and 100 healthy-weight controls using a confidential, self-report questionnaire covering demographic data, sports participation, painful musculoskeletal system symptoms and using computers and playing videogames. The questionnaire's test-retest reliability was tested. Physical examination covered six musculoskeletal syndromes and seven orthopedic disorders. The kappa index for test-retest was 0.724. Pain and musculoskeletal syndromes were equally prevalent in both groups (44 vs. 56%, p = 0.09; 12 vs. 16%, p = 0.541; respectively). Notwithstanding, orthopedic disorders (98 vs. 76%, p = 0.0001), tight quadriceps (89 vs. 44%, p = 0.0001) and genu valgum (87 vs. 24%, p = 0.0001) were significantly more prevalent in obese adolescents than in controls. Median time spent using a computer the day before, on Saturdays and on Sundays were all lower among the obese subjects (30 vs. 60 minutes, p = 0.0001; 1 vs. 60 minutes, p = 0.001; and 0 vs. 30 minutes, p = 0.02; respectively). Obese adolescents were less likely to play handheld videogames (2 vs. 11%, p = 0.003) and there was no difference in the two groups' use of full-sized videogames (p > 0.05). Comparing obese adolescents with pain to those free from pain revealed that pain was more frequent among females (59 vs. 39%, p = 0.048) and was associated with greater median time spent playing on Sundays [0 (0-720) vs. 0 (0-240) minutes, p = 0.028]. Obesity can cause osteoarticular system damage at the start of adolescence, particularly to the lower limbs. Programs developed specifically for obese female adolescents with musculoskeletal pain are needed.

  18. Substance Use among Adolescent Mothers: A Review.

    Science.gov (United States)

    Chapman, Shawna L Carroll; Wu, Li-Tzy

    2013-05-01

    Maternal substance abuse is a critical problem, and adolescent mothers appear to be at high risk for such behaviors. We review studies on postpartum adolescent substance use to explore the extent of this problem and avenues for new research. Authors screened 1,300 studies, identifying 12 articles on substance use among postpartum adolescent mothers for this review. Adolescent mothers reported greater substance use before pregnancy compared to other adolescent females. Although some adolescents continued substance use during pregnancy, most stopped using only to resume within six months after birth. Comparisons of use to national samples of nulliparous adolescent females showed a higher prevalence of substance use in this population. Substances used often varied by race/ethnicity, with white mothers more likely to smoke cigarettes and use marijuana, and Black mothers more likely than whites to drink and use drugs. Of all identified studies, only one focused on Hispanics. Beliefs about drug use grew less negative as girls transitioned from pregnancy to parenthood. As they transitioned to adulthood, substance use remained prevalent and stable. Psychological distress and low self-esteem appeared to influence continued use. Friends' cigarette smoking predicted early initiation of and persistent smoking, while increased education predicted quitting. Early initiation of substances often predicted problem behaviors. Adolescent mothers are a vulnerable population, implicating use of problem behavior theory or the self-medication hypothesis in future research. Multiple avenues for new studies are needed to help identify effective treatment and intervention for this understudied population.

  19. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  20. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  1. Transitions in Friendship Attachment During Adolescence are Associated With Developmental Trajectories of Depression Through Adulthood.

    Science.gov (United States)

    Cook, Stephanie H; Heinze, Justin E; Miller, Alison L; Zimmerman, Marc A

    2016-03-01

    Forming secure friendship attachments during adolescence are important for mental health; few, however, have specifically examined the ways in which the transitions in attachment during adolescence may influence future mental health outcomes among African Americans. The present study examines how transitions in attachment in adolescence predicted changes in depression symptoms from late adolescents through adulthood in an African-American sample. We used growth curve modeling to examine the association between transitions in friendship attachment and changes in depression symptoms in adulthood. At age 16 years, 346 (64.0%) adolescents reported secure attachment with 195 (36.0%) reporting either avoidant or resistant attachment. At age 17 years, 340 (62.9%) reported secure attachment and 201 (37.2%) reported avoidant or resistant attachment. The largest percentage of participants (46.2%) reported stable-secure attachment across the two time points. Results of the growth model indicated that adolescents who reported a stable-secure attachment style had lower levels of depression symptoms during adulthood than those individuals who transitioned from secure-to-insecure, from insecure-to-secure, or were in the stable-insecure group. Interestingly enough, individuals in both the attachment transition groups had a faster declining rate of depression symptoms over time compared to the two stability groups. Data support existing research showing an association between transitions in attachment during adolescence and depression through adulthood. Furthermore, these study findings suggest there may be protective features associated with transitioning between attachment styles during adolescence on later depression, compared to African Americans who remain stable in their attachment style. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  2. Punishing adolescents

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2014-01-01

    Should an adolescent offender be punished more leniently than an adult offender? Many theorists believe the answer to be in the affirmative. According to the diminished culpability model, adolescents are less mature than adults and, therefore, less responsible for their wrongdoings and should...... consequently be punished less harshly. This article concerns the first part of the model: the relation between immaturity and diminished responsibility. It is argued that this relation faces three normative challenges which do not allow for easy answers and which are still widely ignored in the comprehensive...

  3. Contraceptive counseling for adolescents.

    Science.gov (United States)

    Potter, Julia; Santelli, John S

    2015-11-01

    The majority of adolescents become sexually active during their teenage years, making contraceptive counseling an important aspect of routine adolescent healthcare. However, many healthcare providers express discomfort when it comes to counseling adolescents about contraceptive options. This Special Report highlights the evidence supporting age-appropriate contraceptive counseling for adolescents and focuses on best practices for addressing adolescents' questions and concerns about contraceptive methods.

  4. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  5. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  6. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  7. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  8. Fighting fair: Adaptive Marital Conflict Strategies as Predictors of Future Adolescent Peer and Romantic Relationship Quality

    OpenAIRE

    Miga, Erin M.; Gdula, Julie Ann; Allen, Joseph P.

    2011-01-01

    This study examined the associations between reasoning during interparental conflict and autonomous adolescent conflict negotiation with peers over time. Participants included 133 adolescents and their parents, peers, and romantic partners in a multi-method, multiple reporter, longitudinal study. Interparental reasoning at adolescent age 13 predicted greater autonomy and relatedness in observed adolescent-peer conflict one year later and lower levels of autonomy undermining during observed ro...

  9. Technical concept for a greater-confinement-disposal test facility

    International Nuclear Information System (INIS)

    Hunter, P.H.

    1982-01-01

    Greater confinement disposal (GCO) has been defined by the National Low-Level Waste Program as the disposal of low-level waste in such a manner as to provide greater containment of radiation, reduce potential for migration or dispersion or radionuclides, and provide greater protection from inadvertent human and biological intrusions in order to protect the public health and safety. This paper discusses: the need for GCD; definition of GCD; advantages and disadvantages of GCD; relative dose impacts of GCD versus shallow land disposal; types of waste compatible with GCD; objectives of GCD borehole demonstration test; engineering and technical issues; and factors affecting performance of the greater confinement disposal facility

  10. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  11. Secure Multiparty AES

    Science.gov (United States)

    Damgård, Ivan; Keller, Marcel

    We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + {{400}over{255}} expected elementary operations in expected 70 + {{20}over{255}} rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation.

  12. Cloud Computing Security

    OpenAIRE

    Ngongang, Guy

    2011-01-01

    This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...

  13. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  14. Security, insecurity and health.

    Science.gov (United States)

    Coupland, Robin

    2007-03-01

    An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.

  15. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  16. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  17. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  18. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  19. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  20. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  1. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  2. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  3. Design of the national health security preparedness index.

    Science.gov (United States)

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  4. Food Security Strategies for Vanuatu

    OpenAIRE

    Welegtabit, Shadrack R.

    2001-01-01

    This report describes and analyzes food security conditions and policies in Vanuatu. The national food security systems are dualistic in nature, and the rural and urban food security systems are weakly related. Household food security in rural areas is primarily determined by access to arable land and fishery resources, whereas in urban areas household food security is primarily determined by access to employment. Household food security has been a concern in both rural and urban areas. Both ...

  5. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  6. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  7. Database Security: A Historical Perspective

    OpenAIRE

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 ye...

  8. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  9. Adolescent homosexuality.

    Science.gov (United States)

    Stronski Huwiler, S M; Remafedi, G

    1998-01-01

    Homosexuality has existed in all civilizations, but societal disapproval and cultural taboos have negatively influenced its recognition. A significant percentage of youths identify themselves as homosexual, and even more experience sex with the same sex or are confused about sexual feelings. A unifying etiological theory attributes the expression of sexual orientation to genes that shape the central nervous system's development, organization, and structure via prenatal sex steroids. Environmental factors may influence the expression of genetic potential. Several models of psychosocial development describe initial stages of awareness and confusion about same-sex attractions, followed by acknowledgement of homosexuality, disclosure to others, and eventual integration of sexual identity into a comprehensive sense of self. Stressors related to isolation, stigma, and violence may predispose homosexual adolescents to impaired social, emotional, and physical health, resulting in depression and suicide, school problems, substance abuse, running away eating disorders, risky sexual behavior, and illegal conduct. As with all adolescents, the overall goals in the care of homosexual youth are to promote normal adolescent development, social and emotional well-being, and physical health. A comprehensive, multidisciplinary approach is required to address medical, mental health, and psychosocial issues within the context of the adolescents' community and culture.

  10. [Adolescent sexuality].

    Science.gov (United States)

    Calero, Juan del Rey

    2010-01-01

    The social Adolescent features are insecurity, narcissism, eroticism, more impetuosity than reason. 1/3 of adolescents have risk behaviour for health. The pregnancy rate in adolescent are 9/1,000 (11,720, the abort about 50 %). The total abort (2009) were 114,480. Increase the rate of 8,4 (1990) to 14,6/ 1,000 (2009). The sexual education fails. The consulting about contraceptives get pregnancy of the OR 3,2, condom OR 2,7. The adolescent are influenced in his matter: oeer have 70-75 % of influence, mother 30-40 %, father 15 %, for yhe environment and education Cyberspace access to information: 33 % exposed to unwanted sexual materials, 1 in 7 solicited sexual online. The argument have 4 central topic: Morality and Responsibility, Desire (responsibility vs gratification), Danger (fear related to pregnancy and STD/VIH), and Victimization. The prevention of STD: so called safe sex, delayed, and abstinence, Prevention HPV vaccine. The information is not enough, are necessary personal integral formation in values as self control, abstinence, mutual respect, responsibility, reasonable decisions.

  11. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  12. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  13. Bullying in Adolescent Residential Care: The Influence of the Physical and Social Residential Care Environment

    Science.gov (United States)

    Sekol, Ivana

    2016-01-01

    Background: To date, no study examined possible contributions of environmental factors to bullying and victimization in adolescent residential care facilities. Objective: By testing one part of the Multifactor Model of Bullying in Secure Setting (MMBSS; Ireland in "Int J Adolesc Med Health" 24(1):63-68, 2012), this research examined the…

  14. Separation Anxiety in Parents of Adolescents: Theoretical Significance and Scale Development.

    Science.gov (United States)

    Hock, Ellen; Eberly, Mary; Bartle-Haring, Suzanne; Ellwanger, Pamela; Widaman, Keith F.

    2001-01-01

    Developed and validated Parents of Adolescents Separation Anxiety Scale with parents of sixth, eighth, tenth, and twelfth graders, and college freshmen and seniors. Factor analyses supported two subscales: Anxiety about Adolescent Distancing (AAD) and Comfort with Secure Base Role (CSBR); both showed distinctive change patterns with child age.…

  15. Psychodynamic treatment of depressed adolescents.

    Science.gov (United States)

    Bemporad, J R

    1988-09-01

    Depression may be conceptualized as the response to the loss of meaning or satisfaction sufficient to affect the individual's optimal view of the self. At each stage of the life cycle, the failure to achieve developmental tasks threatens the concept of the self, producing a phase-specific vulnerability to depression. Adolescence presents particular stresses by forcing the youngster to relinquish the relative familiarity and security of a childhood psychosocial role and create a sense of self independent of family, without childhood denial mechanisms, and of value to a new peer culture. Most individuals experience a sense of loss, confusion, apprehension, and dysphoria during this difficult period of transition. Many who seek psychotherapy require only a secure holding environment that will support their self-esteem as they create new avenues of worth and satisfaction. A few, however, are so hampered by psychosocial limitations that they cannot master this developmental passage without more extensive therapeutic assistance.

  16. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  17. Roadmap on optical security

    NARCIS (Netherlands)

    javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millan, M.S.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; Peng, X.; Stern, A.; Rivenson, Y.; Alfalou, A.; Brosseau, C.; Guo, C.; Sheridan, J.T.; Situ, G.; Naruse, M.; Matsumoto, T.; Juvells, I.; Tajahuerce, E.; Lancis, J.; Chen, Wen; Chen, X.; Markman, A.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2016-01-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical

  18. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  19. The security aspect

    International Nuclear Information System (INIS)

    Clutterbuck, R.

    1984-01-01

    The question of the risks of deliberate criminal or politically motivated attack, theft or hijacking of irradiated fuel in transit is discussed. Headings; possible forms of interference; security measures; attractions and limitations as a target. (U.K.)

  20. Security vs. Safety.

    Science.gov (United States)

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  1. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  2. Managing for Enterprise Security

    National Research Council Canada - National Science Library

    Caralli, Richard A; Allen, Julia H; Stevens, James F; Willke, Bradford J; Wilson, William R

    2004-01-01

    Security has become one of the most urgent issues for many organizations. It is an essential requirement for doing business in a globally networked economy and for achieving organizational goals and mission...

  3. VMware vsphere security cookbook

    CERN Document Server

    Greer, Mike

    2014-01-01

    This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.

  4. Network Security Visualization

    National Research Council Canada - National Science Library

    1999-01-01

    The application of interactive, three-dimensional viewing techniques to the representation of security-related, computer network status and events is expected to improve the timeliness and efficiency...

  5. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  6. Architecting security with Paradigm

    NARCIS (Netherlands)

    Andova, S.; Groenewegen, L.P.J.; Verschuren, J.H.S.; Vink, de E.P.; Lemos, de R.; Fabre, J.C.; Gacek, C.; Gadducci, F.; Beek, ter M.

    2009-01-01

    For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through

  7. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  8. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... Because GA plays a small but important role in the U.S. economy, improving upon GA security without unduly impeding air commerce or limiting the freedom of movement by air remains a significant challenge...

  9. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  10. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  11. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  12. Media and Security Team

    Data.gov (United States)

    Federal Laboratory Consortium — The Media And Security Team led by Prof. Min Wu was established in Fall 2001 at University of Maryland, College Park. A number of research and education activities...

  13. Credentialed Secure Communication "Switchboards"

    National Research Council Canada - National Science Library

    Freudenthal, Eric; Port, Lawrence; Keenan, Edward; Pesin, Tracy; Karamcheti, Vijay

    2001-01-01

    ... with connection monitoring facilities. Switchboard extends the secure authenticated communication channel abstraction provided by standard interfaces such as SSL/TLS with mechanisms to support trust management, key sharing, service...

  14. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  15. IS (Iris Security)

    OpenAIRE

    Iovane, G.; Tortoriello, F. S.

    2003-01-01

    In the paper will be presented a safety system based on iridology. The results suggest a new scenario where the security problem in supervised and unsupervised areas can be treat with the present system and the iris image recognition.

  16. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  17. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    ... of various GA operations. While some recent high-profile breaches of GA security point to persisting vulnerabilities and limited intelligence information suggests a continued terrorist interest in using GA aircraft...

  18. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  19. Assessing Human Impacts on the Greater Akaki River, Ethiopia ...

    African Journals Online (AJOL)

    We assessed the impacts of human activities on the Greater Akaki River using physicochemical parameters and macroinvertebrate metrics. Physicochemical samples and macroinvertebrates were collected bimonthly from eight sites established on the Greater Akaki River from February 2006 to April 2006. Eleven metrics ...

  20. Comparative Education in Greater China: Contexts, Characteristics, Contrasts and Contributions.

    Science.gov (United States)

    Bray, Mark; Qin, Gui

    2001-01-01

    The evolution of comparative education in Greater China (mainland China, Taiwan, Hong Kong, and Macau) has been influenced by size, culture, political ideologies, standard of living, and colonialism. Similarities and differences in conceptions of comparative education are identified among the four components and between Greater China and other…

  1. Greater temperature sensitivity of plant phenology at colder sites

    DEFF Research Database (Denmark)

    Prevey, Janet; Vellend, Mark; Ruger, Nadja

    2017-01-01

    Warmer temperatures are accelerating the phenology of organisms around the world. Temperature sensitivity of phenology might be greater in colder, higher latitude sites than in warmer regions, in part because small changes in temperature constitute greater relative changes in thermal balance...

  2. Breeding of Greater and Lesser Flamingos at Sua Pan, Botswana ...

    African Journals Online (AJOL)

    to fledging was unknown owing to the rapid drying of the pan in late March 1999. No Greater Flamingo breeding was seen that season. Exceptional flooding during 1999–2000 produced highly favourable breeding conditions, with numbers of Greater and Lesser Flamingos breeding estimated to be 23 869 and 64 287 pairs, ...

  3. Surgical anatomy of greater occipital nerve and its relation to ...

    African Journals Online (AJOL)

    Introduction: The knowledge of the anatomy of greater occipital nerve and its relation to occipital artery is important for the surgeon. Blockage or surgical release of greater occipital nerve is clinically effective in reducing or eliminating chronic migraine symptoms. Aim: The aim of this research was to study the anatomy of ...

  4. Surgical anatomy of greater occipital nerve and its relation to ...

    African Journals Online (AJOL)

    Nancy Mohamed El Sekily

    2014-08-19

    Aug 19, 2014 ... Abstract Introduction: The knowledge of the anatomy of greater occipital nerve and its relation to occipital artery is important for the surgeon. Blockage or surgical release of greater occipital nerve is clinically effective in reducing or eliminating chronic migraine symptoms. Aim: The aim of this research was to ...

  5. INDUSTRIAL LAND DEVELOPMENT AND MANUFACTURING DECONCENTRATION IN GREATER JAKARTA

    NARCIS (Netherlands)

    Hudalah, Delik; Viantari, Dimitra; Firman, Tommy; Woltjer, Johan

    2013-01-01

    Industrial land development has become a key feature of urbanization in Greater Jakarta, one of the largest metropolitan areas in Southeast Asia. Following Suharto's market-oriented policy measures in the late 1980s, private developers have dominated the land development projects in Greater Jakarta.

  6. Strategies for Talent Management: Greater Philadelphia Companies in Action

    Science.gov (United States)

    Council for Adult and Experiential Learning (NJ1), 2008

    2008-01-01

    Human capital is one of the critical issues that impacts the Greater Philadelphia region's ability to grow and prosper. The CEO Council for Growth (CEO Council) is committed to ensuring a steady and talented supply of quality workers for this region. "Strategies for Talent Management: Greater Philadelphia Companies in Action" provides…

  7. Secure quantum key distribution

    Science.gov (United States)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  8. Computer security simulation

    International Nuclear Information System (INIS)

    Schelonka, E.P.

    1979-01-01

    Development and application of a series of simulation codes used for computer security analysis and design are described. Boolean relationships for arrays of barriers within functional modules are used to generate composite effectiveness indices. The general case of multiple layers of protection with any specified barrier survival criteria is given. Generalized reduction algorithms provide numerical security indices in selected subcategories and for the system as a whole. 9 figures, 11 tables

  9. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  10. Data port security lock

    Science.gov (United States)

    Quinby, Joseph D [Albuquerque, NM; Hall, Clarence S [Albuquerque, NM

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  11. Android Applications Security

    OpenAIRE

    Paul POCATILU

    2011-01-01

    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...

  12. Mitigating Docker Security Issues

    OpenAIRE

    Yasrab, Robail

    2018-01-01

    It is very easy to run applications in Docker. Docker offers an ecosystem that offers a platform for application packaging, distributing and managing within containers. However, Docker platform is yet not matured. Presently, Docker is less secured as compare to virtual machines (VM) and most of the other cloud technologies. The key of reason of Docker inadequate security protocols is containers sharing of Linux kernel, which can lead to risk of privileged escalations. This research is going t...

  13. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  14. Computer Security: Competing Concepts

    OpenAIRE

    Nissenbaum, Helen; Friedman, Batya; Felten, Edward

    2001-01-01

    This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing systems (in particular, Mozilla) so that values relevant to web-browser systems are better served than presently they are. The tension, which ...

  15. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  16. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  17. Is knee pain during adolescence a self-limiting condition?

    DEFF Research Database (Denmark)

    Rathleff, Michael S.; Rathleff, Camilla R.; Olesen, Jens L.

    2016-01-01

    BACKGROUND: The prevalence of adolescent knee pain is 33%, and patellofemoral pain (PFP) is the most common diagnosis with a nontraumatic onset. The 2-year prognosis of adolescent PFP compared with other types of knee pain is unknown. PURPOSE: To investigate the 2-year prognosis of knee pain amon...... without knee pain at baseline. CONCLUSION: Knee pain during adolescence, and PFP in particular, is in most cases present after 2 years and thus may not be self-limiting. A greater focus on early detection and prevention of knee pain during adolescence is needed....

  18. 163 COUNTER-TERRORISM IN THE GREATER HORN OF AFRICA ...

    African Journals Online (AJOL)

    Administrator

    2010-07-11

    Jul 11, 2010 ... location in the Horn is strategic. Yet, it is land-locked and .... The insurgents adapted Middle East style suicide bombings. At least one person ... 2002 in Mombasa However, Kenyan security agencies believe that Fazul is alive and is ... In June 2006 IGAD regional ministers ratified a Kenya-led travel ban on.

  19. Breastfeeding Duration Predicts Greater Maternal Sensitivity over the Next Decade

    Science.gov (United States)

    Weaver, Jennifer M.; Schofield, Thomas J.; Papp, Lauren M.

    2018-01-01

    The current study represents the first longitudinal investigation of the potential effects of breastfeeding duration on maternal sensitivity over the following decade. This study also examined whether infant attachment security at 24 months would mediate longitudinal relations between breastfeeding duration and changes in maternal sensitivity over…

  20. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  1. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  2. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  3. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  4. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  5. Adolescent motherhood in Bangladesh: Trends and determinants.

    Science.gov (United States)

    Islam, Mohammad Mainul; Islam, Md Kamrul; Hasan, Mohammad Sazzad; Hossain, Mohammad Bellal

    2017-01-01

    While studies on fertility and contraceptives issues are available, until recently adolescent motherhood has not received enough attention among policy makers in understanding adolescent motherhood in Bangladesh. We aimed to examine the trends and determinants of adolescent motherhood among women aged 15-49 years. For trend analysis we used all the 7 waves of Bangladesh Demographic and Health Survey (BDHS, 1993-2014) data but for multivariate analysis 4 waves of BDHS (2004-2014). Two separate analyses were carried out on ever married women aged 15-49: (1) teenage girls aged 15-19 and (2) adult women aged 20 and above. The prevalence of adolescent motherhood had declined to a slower pace from 1993 to2014 (from 33.0% to 30.8%). Lower spousal age gap and higher education were found to be associated with lower likelihood of adolescent motherhood both among teenage girls [OR 0.447 (0.374-0.533)] and adult women [OR 0.451 (0.420-0.484)]. Teenage girls in the poorest wealth quintile [OR 1.712 [1.350-2.173] were more likely to experience adolescent motherhood than the richest wealth quintile. Teenage girls who had no education were found to have 2.76 times higher odds of adolescent motherhood than their counterparts who had higher than secondary education. Concerning the time effect, the odds of adolescent motherhood among adult women was found to decline overtime. Despite substantial decrease in total fertility rate in Bangladesh adolescent motherhood is still highly prevalent though declining from 1993 to 2014. Social policies including those addressing poverty, ensuring greater emphasis on education for women; and adolescent mothers in rural areas are needed.

  6. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  7. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  8. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  9. Affect, exercise, and physical activity among healthy adolescents.

    Science.gov (United States)

    Schneider, Margaret; Dunn, Andrea; Cooper, Daniel

    2009-12-01

    Many adolescents do not meet public health recommendations for moderate-to-vigorous physical activity (MVPA). In studies of variables influencing adolescent MVPA, one that has been understudied is the affective response to exercise. We hypothesized that adolescents with a more positive affective response to acute exercise would be more active. Adolescents (N = 124; 46% male) completed two 30-min exercise tasks (above and below the ventilatory threshold [VT]), and wore ActiGraph accelerometers for 6.5 +/- 0.7 days. Affective valence was assessed before, during, and after each task. A more positive affective response during exercise below the VT was associated with greater participation in MVPA (p positive affective response to exercise will engage in more MVPA. To promote greater participation in MVPA among adolescents, programs should be designed to facilitate a positive affective experience during exercise.

  10. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  11. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  12. Fractures of the greater trochanter following total hip replacement.

    Science.gov (United States)

    Brun, Ole-Christian L; Maansson, Lukas

    2013-01-01

    We studied the incidence of greater trochanteric fractures at our department following THR. In all we examined 911 patients retrospectively and found the occurance of a greater trochanteric fracture to be 3%. Patients with fractures had significantly poorer outcome on Oxford Hip score, Pain VAS, Satisfaction VAS and EQ-5D compared to THR without fractures. Greater trochanteric fracture following THR is one of the most common complications following THR. It has previously been thought to have little impact on the overall outcome following THR, but our study suggests otherwise.

  13. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  14. 76 FR 46603 - Security Ratings

    Science.gov (United States)

    2011-08-03

    ... settled derivative securities). See Simplification of Registration of Reporting Requirements for Foreign... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No. 33-9245; 34-64975; File No. S7-18-08] RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange...

  15. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  16. A Portable Computer Security Workshop

    Science.gov (United States)

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  17. Considerations for Cloud Security Operations

    OpenAIRE

    Cusick, James

    2016-01-01

    Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.

  18. Modified Small Business Network Security

    OpenAIRE

    Md. Belayet Ali; Oveget Das; Md. Shamim Hossain

    2012-01-01

    This paper covers some likely threats and effectivesteps for a secure small business. It also involves a flowchart tocomprehend the overall small business network security easilyand we identify a set of security issues and applyappropriate techniques to satisfy the correspondingsecurity requirements. In respect of all, this document isstrong enough for any small business network security.

  19. Cryptography for Big Data Security

    Science.gov (United States)

    2015-07-13

    Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S) Distribution A: Public Release Ariel Hamlin1 Nabil...Email: arkady@ll.mit.edu ii Contents 1 Cryptography for Big Data Security 1 1.1 Introduction...48 Chapter 1 Cryptography for Big Data Security 1.1 Introduction With the amount

  20. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  1. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Reiter, M.; Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2007-01-01

    We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is

  2. Intergenerational Transmission of Maladaptive Parenting Strategies in Families of Adolescent Mothers: Effects from Grandmothers to Young Children.

    Science.gov (United States)

    Seay, Danielle M; Jahromi, Laudan B; Umaña-Taylor, Adriana J; Updegraff, Kimberly A

    2016-08-01

    The current longitudinal study examined the effect of the transmission of maladaptive parenting strategies from grandmothers to adolescent mothers on children's subsequent development. Mexican-origin adolescent mothers (N = 204) participated in home interviews when the adolescent's child (89 boys, 60 girls) was 2, 3, 4, and 5 years old. Grandmothers' psychological control toward the adolescent mother was positively related to adolescents' potential for abuse 1 year later, which was subsequently positively related to adolescents' punitive discipline toward their young child. In addition, adolescent mothers' punitive discipline subsequently predicted greater externalizing problems and less committed compliance among their children. Adolescent mothers' potential for abuse and punitive discipline mediated the effects of grandmothers' psychological control on children's externalizing problems. Finally, adolescent mothers' potential for abuse mediated the effect of grandmothers' psychological control on adolescent mothers' punitive discipline. Results highlight the salience of long-term intergenerational effects of maladaptive parenting on children's behavior.

  3. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  4. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  5. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  6. Perceptions of Adolescent Pregnancy Among Teenage Girls in Rakai, Uganda.

    Science.gov (United States)

    Maly, Christina; McClendon, Katherine A; Baumgartner, Joy Noel; Nakyanjo, Neema; Ddaaki, William George; Serwadda, David; Nalugoda, Fred Kakaire; Wawer, Maria J; Bonnevie, Erika; Wagman, Jennifer A

    2017-01-01

    The leading causes of death and disability among Ugandan female adolescents aged 15 to 19 years are pregnancy complications, unsafe abortions, and childbirth. Despite these statistics, our understanding of how girls perceive adolescent pregnancy is limited. This qualitative study explored the social and contextual factors shaping the perceptions of adolescent pregnancy and childbirth among a sample of 12 currently pregnant and 14 never pregnant girls living in the rural Rakai District of Uganda. Interviews were conducted to elicit perceived risk factors for pregnancy, associated community attitudes, and personal opinions on adolescent pregnancy. Findings indicate that notions of adolescent pregnancy are primarily influenced by perceptions of control over getting pregnant and readiness for childbearing. Premarital pregnancy was perceived as negative whereas postmarital pregnancy was regarded as positive. Greater understanding of the individual and contextual factors influencing perceptions can aid in development of salient, culturally appropriate policies and programs to mitigate unintended adolescent pregnancies.

  7. Perceptions of Adolescent Pregnancy Among Teenage Girls in Rakai, Uganda

    Directory of Open Access Journals (Sweden)

    Christina Maly

    2017-08-01

    Full Text Available The leading causes of death and disability among Ugandan female adolescents aged 15 to 19 years are pregnancy complications, unsafe abortions, and childbirth. Despite these statistics, our understanding of how girls perceive adolescent pregnancy is limited. This qualitative study explored the social and contextual factors shaping the perceptions of adolescent pregnancy and childbirth among a sample of 12 currently pregnant and 14 never pregnant girls living in the rural Rakai District of Uganda. Interviews were conducted to elicit perceived risk factors for pregnancy, associated community attitudes, and personal opinions on adolescent pregnancy. Findings indicate that notions of adolescent pregnancy are primarily influenced by perceptions of control over getting pregnant and readiness for childbearing. Premarital pregnancy was perceived as negative whereas postmarital pregnancy was regarded as positive. Greater understanding of the individual and contextual factors influencing perceptions can aid in development of salient, culturally appropriate policies and programs to mitigate unintended adolescent pregnancies.

  8. Childhood adversity and borderline personality disorder: a focus on adolescence.

    Science.gov (United States)

    Newnham, Elizabeth A; Janca, Aleksandar

    2014-01-01

    This article explores recent research in the field of childhood exposure to trauma and the development of borderline personality disorder in adolescence. Adolescence is a critical period of development. Exposure to trauma, specifically sexual abuse, prior to and during puberty has specific implications for personality development and heightens risk for borderline personality disorder. Elevated symptom levels in adolescence are likely to decline across adulthood, but social and vocational impairments remain. Impulsivity, difficulties in emotion regulation, and suicidality may characterize adolescent expression of borderline personality disorder, whereas negative affect and functional impairment are more stable features of the disorder. Preliminary findings in treatment models for adults have potential for benefit among adolescence. Further research is required to examine treatment effectiveness and efficiency. Greater attention to low-income and middle-income nations, which are disproportionately affected by adversity, is needed to determine cross-cultural validity and the impact of trauma in adolescent populations.

  9. Maternal Warmth and Early Adolescents' Internalizing Symptoms and Externalizing Behavior: Mediation via Emotional Insecurity

    Science.gov (United States)

    Alegre, Albert; Benson, Mark J.; Pérez-Escoda, Núria

    2014-01-01

    This study examines the relation between maternal warmth and the internalizing and externalizing problems of early adolescents, and the potential mediation of this relation by emotional insecurity. The hypotheses for the study derive from Cummings and Davies' theory of emotional security. The current study extends the theory to security processes…

  10. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  11. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  12. Prey selection by a reintroduced lion population in the Greater ...

    African Journals Online (AJOL)

    Prey selection by a reintroduced lion population in the Greater Makalali Conservancy, South Africa. Dave Druce, Heleen Genis, Jonathan Braak, Sophie Greatwood, Audrey Delsink, Ross Kettles, Luke Hunter, Rob Slotow ...

  13. LiveDiverse: Case study area, Greater Kruger South Africa

    CSIR Research Space (South Africa)

    Nortje, Karen

    2011-01-01

    Full Text Available Livelihoods and Biodiversity in Developing Countries Case study area: Greater Kruger, South Africa January 2011 Kolhapur, India Where are we? HARDSHIP LIVELIHOODS NATURE & BIODIVERSITY BELIEFS & CULTURAL PRACTISE threesansinv foursansinv onesansinv...

  14. Exploration of the Energy Efficiency of the Greater London Authority ...

    African Journals Online (AJOL)

    GLA Building/City Hall) ... Journal Home > Vol 11, No 2 (2007) > ... The Greater London Authority building was acclaimed as being energy efficient, with claims of 75 % reduction in its annual energy consumption compared to a high specification ...

  15. Molecular insights into the biology of Greater Sage-Grouse

    Science.gov (United States)

    Oyler-McCance, Sara J.; Quinn, Thomas W.

    2011-01-01

    Recent research on Greater Sage-Grouse (Centrocercus urophasianus) genetics has revealed some important findings. First, multiple paternity in broods is more prevalent than previously thought, and leks do not comprise kin groups. Second, the Greater Sage-Grouse is genetically distinct from the congeneric Gunnison sage-grouse (C. minimus). Third, the Lyon-Mono population in the Mono Basin, spanning the border between Nevada and California, has unique genetic characteristics. Fourth, the previous delineation of western (C. u. phaios) and eastern Greater Sage-Grouse (C. u. urophasianus) is not supported genetically. Fifth, two isolated populations in Washington show indications that genetic diversity has been lost due to population declines and isolation. This chapter examines the use of molecular genetics to understand the biology of Greater Sage-Grouse for the conservation and management of this species and put it into the context of avian ecology based on selected molecular studies.

  16. Pathophysiological characterization of asthma transitions across adolescence.

    Science.gov (United States)

    Arshad, Syed Hasan; Raza, Abid; Lau, Laurie; Bawakid, Khalid; Karmaus, Wilfried; Zhang, Hongmei; Ewart, Susan; Patil, Veersh; Roberts, Graham; Kurukulaaratchy, Ramesh

    2014-11-29

    Adolescence is a period of change, which coincides with disease remission in a significant proportion of subjects with childhood asthma. There is incomplete understanding of the changing characteristics underlying different adolescent asthma transitions. We undertook pathophysiological characterization of transitional adolescent asthma phenotypes in a longitudinal birth cohort. The Isle of Wight Birth Cohort (N = 1456) was reviewed at 1, 2, 4, 10 and 18-years. Characterization included questionnaires, skin tests, spirometry, exhaled nitric oxide, bronchial challenge and (in a subset of 100 at 18-years) induced sputum. Asthma groups were "never asthma" (no asthma since birth), "persistent asthma" (asthma at age 10 and 18), "remission asthma" (asthma at age 10 but not at 18) and "adolescent-onset asthma" (asthma at age 18 but not at age 10). Participants whose asthma remitted during adolescence had lower bronchial reactivity (odds ratio (OR) 0.30; CI 0.10 -0.90; p = 0.03) at age 10 plus greater improvement in lung function (forced expiratory flow 25-75% gain: 1.7 L; 1.0-2.9; p = 0.04) compared to persistent asthma by age 18. Male sex (0.3; 0.1-0.7; p adolescent-onset asthma showed eosinophilic airway inflammation (3.0%, 0.7-6.6), not seen in persistent asthma (1.0%, 0-3.9), while remission group had the lowest sputum eosinophil count (0.3%, 0-1.4) and lowest eosinophils/neutrophils ratio of 0.0 (Interquartile range: 0.1). Asthma remission during adolescence is associated with lower initial BHR and greater gain in small airways function, while adolescent-onset asthma is primarily eosinophilic.

  17. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  18. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  19. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  20. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...