WorldWideScience

Sample records for homeland security perspective

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  3. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  4. Homeland Security and Information.

    Science.gov (United States)

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  5. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  6. Transatlantic Homeland Security

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja; Hamilton, Daniel

    This major new study presents both conceptual and practical guidance at a crucial time when intellectual and practical efforts to protect against the new terrorism should move beyond a purely domestic focus. Creating an effective and integrated national homeland security effort is a significant...... challenge. Europe and the United States have reacted differently to the emergence of mass casualty terrorism, but must work together to cope with the diverse issue areas, sectors, professions, and relevant actors involved in such a broad-based concept. The authors suggest that Europe and the US have a lot...

  7. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information...

  8. Homeland Security: A Selected Bibliography

    Science.gov (United States)

    2011-04-01

    March 7, 2006. 19pp. (AD-A449- 850) http://handle.dtic.mil/100.2/ADA449850 Flynn, Stephen E., and Daniel B. Prieto . Neglected Defense: Mobilizing...R41250.pdf Flynn, Stephen E., and Daniel B. Prieto . Neglected Defense: Mobilizing the Private Sector to Support Homeland Security. New York: Council...ADA478240 Clarke, Richard Alan . Your Government Failed You: Breaking the Cycle of National Security Disasters. New York: Ecco, 2008. 408pp

  9. Robotic systems for homeland security

    Science.gov (United States)

    Esser, Brian; Miller, Jon; Huston, Dryver R.; Bourn, Phil

    2004-07-01

    This paper will present the concept of utilizing various mobile robotic platforms for homeland security. Highly specialized mobile robots equipped with the proper sensors and data processing capabilities have the ability to provide security and surveillance for a wide variety of applications. Large infrastructure components, such as bridges, pipelines, dams, and electrical power grids pose severe challenges for monitoring, surveillance, and protection against man-made and natural hazards. The structures are enormous, often with awkward and dangerous configurations that make it difficult, if not impossible, for continuous human surveillance. Properly outfitted robots have the potential to provide long-term surveillance without requiring continuous human supervision. Furthermore, these robotic platforms can have disaster mitigation capabilities such as evaluation of infrastructure integrity at the disaster site. The results presented will include proof-of-concept robotic platforms equipped with various sensor arrays, as well as discussion of design criteria for numerous homeland security applications.

  10. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  11. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  12. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  13. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... homeland security, results of a cyber security exercise, sharing information with others, and Southwest... would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  14. Homeland security intelligence : to what end?

    OpenAIRE

    2010-01-01

    CHDS State/Local Approved for public release; distribution is unlimited In this thesis, I present potential solution sets to the question of why homeland security leaders and practitioners use intelligence to improve homeland security decisions. Specific roles and benefits of intelligence are identified, analyzed, and where applicable, extended to domestic security objectives across the homeland security community spectrum. This thesis purports and defends the theory that there are many...

  15. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... AGENCY Department of Homeland Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA... of Homeland Security. The Department of Homeland Security will work with OPP pursuant to the Homeland Security Presidential Directives and the 2009 National Infrastructure Protection Plan. DATES:...

  16. The Proposed Homeland Security Budget for 2013

    Science.gov (United States)

    2012-09-01

    United States Holocaust Memorial Museum. CBO 6 THE PROPOSED HOMELAND SECURITY BUDGET FOR 2013 CBOFigure 2. Homeland Security Funding Requested by the...Marshals Service Bureau of Alcohol, Tobacco, Firearms, and Explosives Federal Bureau of Investigation Miscellaneousa Food and Drug Administration...Administration National Security Division Food and Drug Administration Federal Bureau of Investigation Firearms, and Explosives Bureau of Alcohol, Tobacco

  17. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  18. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... violent extremism domestically; the current threat environment; evolving threats in cyber security... receive a briefing on evolving threats in cyber security. This will include lessons learned and potential... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of...

  19. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ...) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the... (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Closed...

  20. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  1. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management... providing strategic, timely and actionable advice. ] The HSAC will meet publicly to swear in new Council members, receive observations and remarks from DHS senior leadership, and review and...

  2. U.S. Homeland Security R&D Budgets

    Energy Technology Data Exchange (ETDEWEB)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  3. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  4. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  5. Homeland Security Affairs Journal, Volume IV - 2008: Issue 3, October

    OpenAIRE

    2008-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. October 2008. The articles in this issue of Homeland Securit...

  6. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Homeland Security Labor Relations Board. 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  7. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  8. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26, 2010...

  9. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  10. 33 CFR 101.205 - Department of Homeland Security alignment.

    Science.gov (United States)

    2010-07-01

    ... alignment. 101.205 Section 101.205 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Department of Homeland Security alignment. The MARSEC Levels are aligned with the Department of Homeland... alignment. Table 101.205—Relation Between HSAS and MARSEC Levels Homeland security advisory system...

  11. Analytical Approaches to Address Homeland Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Holter, Gregory M.; Young, Jonathan

    2003-11-01

    Homeland security concerns arising since September 11, 2001, have captured national attention and sparked a number of responses at all levels of government. As events have unfolded and the nature of the situation has become better understood within the United States, the need for effective planning and response has resulted in the identification of significant analytical challenges. These challenges relate to a number of different needs, including the following: (1) estimating the probability and the potential impact of various threats, (2) identifying the need for and effectiveness of specific counter-measures, and (3) assessing the combined results of interacting activities and events. Analytical approaches traditionally used for safety engineering and risk analysis, coupled with analytical approaches borrowed from other systems analysis disciplines, can be usefully adapted to help meet these challenges. This paper identifies and discusses several illustrative examples of the analytical challenges currently being faced with respect to homeland security. Linkages are then examined between these specific challenges and traditional analytical approaches from a variety of disciplines, including safety engineering and risk analysis. Since effective cooperation among responsible agencies and organizations has been identified as an issue of concern and is essential to achieve an effective homeland security strategy and response capability, issues relating to multiple interacting activities are specifically highlighted.

  12. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  13. Homeland security in the USA: past, present, and future.

    Science.gov (United States)

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  14. A value model for evaluating homeland security decisions.

    Science.gov (United States)

    Keeney, Ralph L; von Winterfeldt, Detlof

    2011-09-01

    One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these elements form a homeland security value model. This article develops a homeland security value model based on literature reviews, a survey, and experience with building value models. The purposes of the article are to motivate the use of a value model for homeland security decision making and to illustrate its use to assess terrorism risks, assess the benefits of countermeasures, and develop a severity index for terrorism attacks. © 2011 Society for Risk Analysis.

  15. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  16. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC....

  17. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    National Preparedness: A Case Study in the Development of Public Policy,” Sam Clovis agrees that homeland security is a national issue but...recommends that state and local governments have maximum flexibility in implementing homeland security programs ( Clovis , 2006). He sees the federal...national preparedness ( Clovis , 2006). The author goes on to recommend a framework of “Collaborative Federalism” for homeland security. A review of

  18. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  19. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    Exchange Commission (SEC), was a champion of plain language and realized how critical it is for financial documents. The SEC handbook remains an excellent...contagious back to the 1930s, as described in the Jacob Moreno sociograms. The language of contagion is part of pop culture today, and it is common to... contagion are also applicable to resiliency matters of homeland security. Fostering resilient behaviors in the community can have a contagious influence on

  20. Risk Unbound: Threat, Catastrophe, and the End of Homeland Security

    Science.gov (United States)

    2015-09-01

    something different of homeland security professionals. B. PROBLEM STATEMENT Three dominant pillars of homeland security theory and practice...term is that in which the price of copper and the rate of interest twenty years hence, all the obsolescence of a new invention are uncertain. About

  1. Groupthink: a significant threat to the homeland security of the United States

    OpenAIRE

    Ricciuti, James E.

    2014-01-01

    Approved for public release; distribution is unlimited The groupthink psychological phenomenon prevalent in the homeland security enterprise is a significant threat to the United States. Homeland security is vulnerable to groupthink because its leaders frequently share similar backgrounds, work histories, and world-views. This similarity minimizes the chance of outside perspectives being introduced to the decision-making process, which insulates leadership from external ideas. This researc...

  2. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... SECURITY Committee Name: Homeland Security Information Network Advisory Committee (HSINAC) AGENCY... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the...

  3. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Science.gov (United States)

    2010-07-29

    ... SECURITY Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday, August... meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet from... Homeland Security Information Network Advisory Committee is to identify issues and provide to...

  4. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura

  5. 75 FR 59278 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-09-27

    ... enforcement agencies concerning transportation infrastructure. Members will also receive domestic and international intelligence briefings that are focused on threats against the homeland which require responsive... vulnerabilities identified in a cyber exercise and discuss potential methods to improve a federal response...

  6. Ultrafast fiber lasers for homeland security

    Science.gov (United States)

    Okhotnikov, O. G.

    2005-09-01

    Detecting weapons concealed underneath clothing, analyzing the contents of suspicious-looking envelopes, or even spotting the onset of cancer: these are just some of the exciting prospects that have been turning terahertz wave research into one of the most important topics in photonics. Most broadband pulsed THz sources are based on the excitation of different materials with ultrashort laser pulses. So far, generation of tunable narrow-band THz radiation has been demonstrated using ultrafast solid state lasers as a source of high-intensity optical pulses. The lack of a high-power, low-cost, portable room-temperature THz source is the most significant limitation of modern THz systems. Advances in fiber laser technology can be used to further the capabilities of the homeland security. Using semiconductor saturable absorber mirrors allows for reliable mode-locked operation with different values of cavity dispersion in a broad spectrum ranged from 900 to 1600 nm. Semiconductor saturable absorbers mirrors have been used successfully to initiate and to sustain mode-locking in a wide range of core-pumped fiber lasers. The main advantage of the semiconductor saturable absorber mirrors (SESAM) is the possibility to control important parameters such as absorption recovery time, saturation fluence and modulation depth through the device design, growth conditions and post-growth processing. The SESAM as a cavity mirror in the fiber laser results in compact size, environmentally stable and simple ultrashort pulse lasers that can cover wide wavelength range and generate optical pulses with durations from picoseconds to femtoseconds. Employing SESAM technology for mode-locking, the double-clad fiber laser promises superior pulse quality, high stability and pulse energy without need for power booster that eventually degrades the pulse quality due to nonlinear distortions in the amplifier fiber. We give an overview of recent achievements in ultrafast fiber lasers; discuss basic

  7. Managing Materials and Wastes for Homeland Security Incidents

    Science.gov (United States)

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  8. 77 FR 37912 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-06-25

    ... community approach and preparedness culture within student and neighboring communities; how to strengthen... relating to student and recent graduate recruitment; international students; academic research; campus and... (Student and Recent Graduate Recruitment, Homeland Security Academic Programs, Academic Research and...

  9. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  10. Solving homeland security's wicked problems: a design thinking approach

    OpenAIRE

    Wyckoff, Kristin L.

    2015-01-01

    Approved for public release; distribution is unlimited The Department of Homeland Security’s Science and Technology Directorate (DHS S&T) requires a consistent yet flexible approach to address wicked problems. A design-thinking methodology holds promise, as its tenets align with the diversity and complexity inherent within the homeland security environment. Design thinking emphasizes a human-centered and multidisciplinary approach to solution development. The research examined how design t...

  11. Homeland Security Department: FY2011 Appropriations

    Science.gov (United States)

    2010-08-27

    administers several programs, including the BioWatch program, the National Biosurveillance Integration System (NBIS), and the department’s...coordination activities are implemented); the National Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.104...Acquisition 20 61 78 Radiation Portal Monitoring Program — 8 20 Securing the Cities 20 — 20 Human Portable Radiation Detection Systems — 53 38

  12. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  13. Homeland Security Department: FY2009 Appropriations

    Science.gov (United States)

    2009-03-04

    programs throughout DHS, and administers several of them, including the BioWatch program, the National Biosurveillance Integration System (NBIS...increase of $68 million for procurement of Advanced Spectroscopic Portals (ASPs) was partly offset by a decrease of $10 million for the Securing the...Nuclear Forensics Center, and $15 million for the Radiation Portal Monitoring Program. The House continued the prohibition on full-scale procurement

  14. Homeland Security Department: FY2006 Appropriations

    Science.gov (United States)

    2005-06-29

    continuing resolution.” e. P.L. 101-130, enacted after the Loma Prieta earthquake, appropriated $1.1 billion in supplemental funding for FY1990. In...cooperate with and assist DHS in any investigation or reinvestigation. The authorization would cease to be effective once the President has selected...that investigations for DHS security clearances are done in the most timely and efficient manner once the 9/11 Act reforms take effect .” (Congressional

  15. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    significant such historical comparisons are for today. One of the most important developments has been the establishment of a network of 78 state...mission of directing DOD cyber opera- tions and defending military information networks . The commander of USCYBERCOM also serves as director of the...to telecoms to aviation.”71 In recent years it seems as if just about everybody in the national security and intelligence communities has jumped on

  16. Homeland Security Affairs Journal, Volume VII - 2011, 10 Years After: The 9/11 Essays

    OpenAIRE

    2011-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. 10 Years After: the 9/11 Essays. Homeland Security Affairs (...

  17. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  18. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science...

  19. Homeland Security Research and Development Funding, Organization, and Oversight

    Science.gov (United States)

    2006-08-22

    University of Southern California; agro-security at the University of Minnesota and at Texas A&M; on behavioral and sociological aspects of terrorism at the...computational challenges for homeland security. DHS also supports a university fellowship /training program, which plans to train 200 students in 2007, down from...300 in 2006, and up to 15 postdoctoral fellows. Regarding intramural R&D, DHS may use any federal laboratory and may establish a headquarters

  20. Modeling Homeland Security: A Value Focused Thinking Approach

    Science.gov (United States)

    2013-02-21

    BIB -1 viii List of Figures Page Figure 2-1: Organization of the Department of Homeland Security...richard.deckro@afit.edu. BIB -1 Bibliography 1. Advisory Panel to Assess Domestic Response Capabilities For Terrorism Involving Weapons of...House, 2002. BIB -2 13. CERN: European Organization for Nuclear Resources. “Affinity Diagram.” Technical Support Division. November 2002

  1. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal Emergency...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue...

  2. The Role of the National Guard in Homeland Security

    Science.gov (United States)

    2007-05-01

    became the tool to militarily protect the westward expansion. In 1790, under Harmer , and in 1791 under St. Clair, forces which consisted of primarily...militia with additional regular units were defeated by Indians in the Northwest frontier. Both Harmer and St. Clair defended themselves by...and Charles W. Yost. Army Forces for Homeland Security. Santa Monica, CA: RAND Corporation, 2004. Davis, Lynn E., and Jeremy Shapiro, ed. The U.S

  3. Federal-Tribal Government Collaboration in Homeland Security

    Science.gov (United States)

    2007-09-01

    wide variety of national critical infrastructure. Dams, water impoundments and reservoirs, electrical generation plants, drinking water, and...Kalt and Singer point out, “did not and do not absorb the tribes into the United States; rather, the reverse is true. The treaties recognize and...identified as a point of need for effective homeland security actions, Kettl points out that without better collaboration between the state and local

  4. Creation of a Homeland Security Jail Information Model

    Science.gov (United States)

    2012-03-01

    In contrast, law enforcement officers at a jail have a better gestalt understanding of homeland security threats and trends in the same...and my personal familiarity with each model. In his book Beyond the Two Disciplines of Scientific Psychology , Lee Cronbach claims that...muhajir.background/index.html Cronbach, L. J. (1975). Beyond the two disciplines of scientific psychology . Washington, D.C.: American Psychologist

  5. The Homeland Security Enterprise: Where Do We Fit?

    Science.gov (United States)

    2009-09-01

    they are dependent upon the grant funding to help offset the burdens of establishing and maintaining a state of readiness. Samuel Clovis (2006...by Samuel H. Clovis , Jr., Chair of the Department of Business Administration and Economics at Morningside College in Sioux City, Iowa. 15 Like...Secretary Chertoff (2006, p. 1), Clovis (2006, p. 1) asserts future homeland security challenges “Require solutions for which the existing structures

  6. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    familysecuritymatters.org/publications/id.7744/pub_detail.asp. 2 Arthur Tulak, Robert Kraft, and Don Silbaugh, “State Defense Forces and Homeland Security...not part of an elite group of well-armed, well-trained military soldiers hardened by the trials of lethal combat—most were simply the undesirables of...Guard. Accessed September 15, 2014. http://www.tnmilitary.org/tennessee-state- guard.html. Tulak, Arthur , Robert Kraft, and Don Silbaugh. “State

  7. Role of Information Management in Advancing Homeland Security

    Science.gov (United States)

    2011-07-01

    understanding they need to make decisions. Many articles have addressed the tangled web of homeland security issues in terms of authorities, bud- gets , or...directly impact public safety. Despite significant strides since 9/11, decision makers at all levels still do not get the information they need when...Texas Law Review, Vol. 88, p. 1854. 7. Merrie Archer, “The Whole of Government Planning Process,” U.S. Department of State, Washington, D.C., 18

  8. The Fire Service’s Role in Maritime Homeland Security

    Science.gov (United States)

    2011-03-01

    homeland security partners, information sharing, planning and ferry/ cruise ship response. Leaders from other federal and local agencies that have a role...explosion on a cruise ship or ferryboat will require a fire boat, response vessels and specialized training. Currently, the ability of first...responders to work with cruise ships is at the discretion of the cruise ship operators as most of these vessels are foreign flagged and local governments

  9. Homeland security: sharing and managing critical incident information

    Science.gov (United States)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  10. Application of Near-Space Passive Radar for Homeland Security

    Science.gov (United States)

    Wang, Wenqin

    2007-03-01

    To protect the homeland from terrorist attacks employing explosive devices, revolutionary advances across a wide range of technologies are required. Inspired by recent advances in near-space (defined as the region between 20 km and 100 km), this paper proposes a new passive radar system using opportunistic transmitter as an illuminator and near-space platform as a receiver. This concept differs substantially from current radars. This system can be operated as a passive bistatic or multistatic radar and hence largely immune to jamming. By placing the receiver in near-space platforms, many functions that are currently performed with satellites or airplanes could be performed much more cheaply and with much greater operational utility. These advantages make near-space passive attractive for a variety of applications, many of which fit well with the needs of homeland security. This paper details the role of near-space passive radar as sensor system that can support homeland security applications. The strengths and weakness of near-space passive radar, compared to current spaceborne and airborne radars, are detailed. The signal models and processing algorithms for near-space passive radar are provided. It is shown that the use of cost effective near-space platforms can provide the solutions that were previously thought to be out of reach to remote sensing and government customers.

  11. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed...-036, Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6036....

  12. Field-Capable Biodetection Devices for Homeland Security Missions

    Energy Technology Data Exchange (ETDEWEB)

    Dougherty, G M; Clague, D S; Miles, R R

    2007-04-05

    Biodetection instrumentation that is capable of functioning effectively outside the controlled laboratory environment is critical for the detection of health threats, and is a crucial technology for Health Security. Experience in bringing technologies from the basic research laboratory to integrated fieldable instruments suggests lessons for the engineering of these systems. This overview will cover several classes of such devices, with examples from systems developed for homeland security missions by Lawrence Livermore National Laboratory (LLNL). Recent trends suggest that front-end sample processing is becoming a critical performance-determining factor for many classes of fieldable biodetection devices. This paper introduces some results of a recent study that was undertaken to assess the requirements and potential technologies for next-generation integrated sample processing.

  13. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting...

  14. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that...

  15. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... Management Agency--006 Citizen Corps Database'' and retitle it ``Department of Homeland Security/ Federal... System name: DHS/FEMA--006 Citizen Corps Program Security classification: Unclassified. System location... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal...

  16. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC); Meeting AGENCY: OPS/OCIO, DHS... Security Information Network Advisory Committee (HSINAC) will meet on Tuesday, June 25th, 2013 from 1 p.m...: http://www.dhs.gov/homeland-security-information-network-advisory-committee . There is a meeting...

  17. 19 CFR 111.34 - Undue influence upon Department of Homeland Security employees.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Undue influence upon Department of Homeland... Brokers § 111.34 Undue influence upon Department of Homeland Security employees. A broker must not influence or attempt to influence the conduct of any representative of the Department of Homeland Security...

  18. Test of radiation detectors used in homeland security applications.

    Science.gov (United States)

    Pibida, L; Minniti, R; O'Brien, M; Unterweger, M

    2005-05-01

    This work was performed as part of the National Institute of Standards and Technology (NIST) program to support the development of the new American National Standards Institute (ANSI) standards N42.32-2003 and N42.33-2003 for hand-held detectors, and personal electronic dosimeters, as well as to support the Office of Law Enforcement Standards (OLES) and the Department of Homeland Security (DHS) in testing these types of detectors for their use by first responders. These instruments are required to operate over a photon energy range of 60 keV to 1.33 MeV and over a wide range of air-kerma rates. The performance and response of various radiation detectors, purchased by the NIST, was recorded when placed in 60Co, 137Cs, and x-ray beams at different air-kerma rates. The measurements described in this report were performed at the NIST x-ray and gamma-ray radiation calibration facilities. The instruments' response (exposure or dose rate readings) shows strong energy dependence but almost no dependence to different air-kerma rates. The data here reported provide a benchmark in support of current protocols that are being developed for radiation detection instrumentation used in homeland security applications. A future plan is to test these devices, plus other commercially available detectors, against ANSI standards N42.32-2003 and N42.33-2003.

  19. Nuclear Theory for Astrophysics, Stockpile Stewardship, and Homeland Security

    Science.gov (United States)

    Hayes, Anna

    2004-10-01

    A large number of problems key to astrophysics, stockpile stewardship, and homeland defense rely on knowledge of nuclear physics in regimes inaccessible to experiment. In stellar and nuclear explosions unstable nuclei and nuclear isomers are produced in copious quantities and are used to diagnose the explosion. Similarly, analysis of the unstable nuclei from the debris will be key to attribution in the event of a terrorist domestic nuclear attack. In the case of nuclear non-proliferation a number of new schemes are being considered by the IAEA to address the ever greater needs, including neutrino monitoring of the plutonium content of reactors. For all of these problems detailed nuclear theory is required. In this talk I discuss the theoretical physics needs for the type of problems of overlapping interest to astrophysics and national security.

  20. Pulse-shape discrimination scintillators for homeland security applications

    Science.gov (United States)

    Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.

    2016-09-01

    An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.

  1. The Impact of Organizational Culture on the Sharing of Homeland Security Information

    Science.gov (United States)

    2008-04-04

    IMPACT OF ORGANIZATIONAL CULTURE ON THE SHARING OF HOMELAND SECURITY INFORMATION By Jeffery E. Bradey GS-15, Department of Defense...information sharing tool. 15. SUBJECT TERMS organizational culture , Homeland Security Information Network, information sharing 16. SECURITY...41 Organizational Culture .................................................................................................. 41

  2. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS..., 56662-56663 that the Homeland Security Science and Technology Advisory Committee (HSSTAC) would meet on... will be held at the Department of Homeland Security (DHS), Science and Technology Directorate, 1120...

  3. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Future of Homeland Security,” FDCH Congressional Testimony (July 12, 2012): Military & Government Collection, EBSCOhost , 2, (accessed July 31, 2012...Government Collection, EBSCOhost , 1, (accessed July 31, 2012). 12 U.S. Department of Homeland Security, Department of Homeland Security Strategic Plan...Department’s Roles/Missions,” FDCH Political Transcripts (n.d.): Military & Government Collection, EBSCOhost , 8, (accessed July 31, 2012). 14 Don Harvey and

  4. Wearable high-tech gear for homeland security personnel

    Science.gov (United States)

    Venkateswarlu, Ronda; Hui Wei, Choo; Li Lian, Ngiam; Lim, E. T.; Zhu, Zijian; Yang, Mingjiang

    2006-05-01

    Recent homeland security problems in various countries indicate that fixed surveillance systems at important places are not adequate enough. As the security threats take new dimensions in future, mobile smart security personnel wearing high-tech gear will form the basic infrastructure. See first, listen first, detect first, track first, communicate first with peers, assess the threat and coordinate with security head-quarters are the functions of high-tech gear. This paper proposes a high-tech gear involving (i) hands-free and obtrusion-free textile-based wearable microphone array to capture users voice and interface with body-worn computer, (ii) microphone arrays embedded in textiles to listen and record others voices from a distance, (iii) miniature cameras embedded in the shirt to provide the user with omni vision (iv) wireless personal display as GUI hidden in textile or natural glasses, (v) GPS and body area network for positional awareness for information in the form of text or textile integrated, (vi) reconfigurable HW/SW for all the above functions configured in the form of a usual belt. The main focus of this paper is how to configure the high-tech gear with all these sophisticated functions to disappear into the natural wearables of the user giving him normal look in the public. This project is sponsored by Defence Science & Technology Agency, Ministry of Defence, Singapore. This paper covers multi-discipline technologies at system level, hence not possible to go into details of any subsystem. The main objective of this paper is to share our thoughts and get feedback. Progress and some critical design issues are discussed in this paper.

  5. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... Administration-015 Registered Traveler Operations Files (November 8, 2005, 69 FR 67735), which was written to...)-015 Registered Traveler (RT) Operations File Files (November 8, 2005, 69 FR 67735), which was written... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland...

  6. Fire Stations - FIRE_STATIONS_HSIP_IDHS_IN: Fire Stations in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — FIRE_STATIONS_HSIP_IDHS_IN is a point shapefile that contains locations of fire station, as developed for the Homeland Security Infrastructure Program (HSIP). The...

  7. Hospitals - HOSPITALS_HSIP_IDHS_IN: Hospitals in Indiana as Developed for the Homeland Security Infrastructure Program (Indiana Department of Homeland Security, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — HOSPITALS_HSIP_IDHS_IN is a point shapefile that contains hospital locations, as developed for the Homeland Security Infrastructure Program (HSIP). The data were...

  8. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  9. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    Constitution. From the requirement for Congress to appropriate money before the executive branch can spend it, to the advice and consent given by the...addressed and improve bills. a. Recommendation 14 The homeland security committees should take any parliamentary actions that will help them secure... parliamentary actions that will help them secure larger jurisdiction over homeland security topics. 101 APPENDIX B. HURRICANE KATRINA HEARINGS Date

  10. How Should Municipal Police Agencies Participate in America’s Homeland Security Strategy?

    Science.gov (United States)

    2008-12-01

    from a decidedly federal approach to a municipal orientation. After all, Thomas Ridge, former director of the department of Homeland Security, said...policy or operating procedures is 82 Remarks By Homeland Security Director Thomas Ridge to...R. Mauborgne. Blue Ocean Strategy. Massachusetts: Harvard Business School Press, 2005. Laqueur , Walter. The New Terrorism: Fanaticism and the Arms

  11. Defining the Role and Responsibility of the Fire Service Within Homeland Security

    Science.gov (United States)

    2010-03-01

    High Low Strategy Canvas : The Fire Service’s Approach to Homeland Security Eliminate Raise Reduce Create A Holistic Approach to Homeland Security Red...The starfish and the spider : The unstoppable power of leaderless organizations. London, England: Penguin Books Ltd. Bryson, J. (2004). Strategic

  12. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    Science.gov (United States)

    2007-09-01

    Rosell, Richard, “2007 Troop “C” Strategic Plan”. Hamilton: NJSP, 2007. Schwarzenegger , Arnold . California State Homeland Security Strategy...Strategy’s CMA do not contain goals. Arnold Schwartzenegger, The California Homeland Security Strategy. (Sacramento: Office of the Governor, 2005

  13. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Science.gov (United States)

    2011-04-06

    ...In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ``Department of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program Records System of Records.'' This system of records will allow the Department of Homeland Security/Federal Emergency Management Agency to collect and maintain records on its training and exercise programs. This system of records will include the personally identifiable information of current and former Federal Emergency Management Agency employees and contractors, current and former members of the first responder and emergency management communities, and others who have applied or registered to participate in or who have assisted with Federal Emergency Management Agency's training and exercise programs. The Department of Homeland Security is issuing a Notice of Proposed Rulemaking, to exempt this system of records from certain provisions of the Privacy Act, elsewhere in the Federal Register. In addition, in accordance with the Privacy Act of 1974 the Department of Homeland Security is giving notice that it proposes to consolidate the Privacy Act system of records notice titled, Department of Homeland Security/ Federal Emergency Management Agency/National Emergency Training Center--017 Student Application and Registration Records system of records (October 5, 2004, 69 FR 192) into this system of records. This newly established system will be included in the Department of Homeland Security's inventory of record systems.

  14. 75 FR 41097 - Homeland Security Acquisition Regulation; Lead System Integrators [HSAR Case 2009-003

    Science.gov (United States)

    2010-07-15

    ...The Department of Homeland Security (DHS) is issuing an interim rule amending the Homeland Security Acquisition Regulation (HSAR) to implement section 6405 of the U.S. Troop Readiness, Veterans' Care, Katrina Recovery, and Iraq Accountability Appropriations Act, 2007. This section of the Act and these implementing regulations restrict contractors from acting as lead system integrators in the......

  15. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Science.gov (United States)

    2010-09-10

    ... private sector. Additionally, the Department of Homeland Security is issuing a Notice of Proposed... SECURITY Office of the Secretary Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security... the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department...

  16. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... Security Management System of Records AGENCY: Privacy Office; DHS. ACTION: Notice of Privacy Act system of... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... routine uses of this system have been reviewed and updated to reflect the personnel security...

  17. The National Guard and its Role in Homeland Security

    Science.gov (United States)

    2007-11-02

    Mobilizing Against Terrorism," CQ Weekly 57, no. 10 (6 March 99) 522 [ database on-line]; available from EBSCOhost ; accessed 8 September 2001. 34 Alan Ferber...November 2001. 6 Ibid. ś Kevin Stringer, "A Homeland Defense Mission," Military Review 80 (May/June 2000) 98 [ database on-line]; available from UMI...Implications for Homeland Defense," Abstract from Air University Research Database ; available from http://au.af.mil/au/ database /research/ay2001/affp

  18. 19 CFR 0.2 - All other CBP regulations issued under the authority of the Department of Homeland Security.

    Science.gov (United States)

    2010-04-01

    ... authority of the Department of Homeland Security. 0.2 Section 0.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY TRANSFERRED OR DELEGATED AUTHORITY § 0.2 All other CBP regulations issued under the authority of the Department of Homeland Security. (a...

  19. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... and future leadership, employees, and the public about the history of the Department. DHS is... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--027 The History..., Department of Homeland Security-2004- 0004 Oral History Program: The History of the Department of Homeland...

  20. 41 CFR 102-73.196 - What types of special purpose space may the Department of Homeland Security lease?

    Science.gov (United States)

    2010-07-01

    ... purpose space may the Department of Homeland Security lease? 102-73.196 Section 102-73.196 Public... Delegations § 102-73.196 What types of special purpose space may the Department of Homeland Security lease? The Department of Homeland Security is delegated authority to lease whatever space its...

  1. Solving Homeland Security’s Wicked Problems: A Design Thinking Approach

    Science.gov (United States)

    2015-09-01

    business innovation research, futures and forecasting , prize authority, business accelerators, and engagement with industry, international...tackle homeland security’s complex problems. 14. SUBJECT TERMS design thinking, innovation , DHS S&T, Department of Homeland Security, science and...design thinking? .......................................................................................16 a. Innovation Labs

  2. An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.

  3. Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal

    Science.gov (United States)

    2011-12-01

    and how they will be disseminated. The intelligence analysis/production step and risk analysis/production step represent a codependent ...NEED FOR COLLABORATION IN RISK MANAGEMENT Risk management and intelligence within the homeland security context share a codependent relationship

  4. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... terrorists, drug cartel leaders or other persons known to have been involved in major crimes or terror of... to Homeland Security; and Known terrorists, drug cartel leaders or other persons known to have...

  5. Homeland Security Vulnerabilities Of The US National Capital Region’s Bridges

    Science.gov (United States)

    2016-06-10

    THE HOMELAND SECURITY VULNERABILITIES OF THE US NATIONAL CAPITAL REGION’S BRIDGES A thesis presented to the Faculty of the U.S...AUG 2015 – JUNE 2016 4. TITLE AND SUBTITLE The Homeland Security Vulnerabilities of the US National Capital Region’s Bridges 5a. CONTRACT...SUPPLEMENTARY NOTES 14. ABSTRACT The National Capital Region (NCR) is plagued by the same critical infrastructure vulnerabilities, disrepair, and

  6. Bureaucracies, communities and networks : interagency cooperation for Homeland Security In Monterey County

    OpenAIRE

    Scott, Gerald R.

    2003-01-01

    Approved for public release; distribution is unlimited. The federal government has undertaken a massive reorganization in order to create the Department of Homeland Security, and a parallel debate over how to organize homeland security functions has arisen at the State and Local government levels. In a time of severe budget constraints and rapidly changing threats, governments at all levels recognize the need for multiple government agencies, the private sector and nongovernmental organiza...

  7. Integrating statewide research and education resources for homeland security: the State University System of Florida Consortium on Homeland Security (Invited Paper)

    Science.gov (United States)

    Pearson, James E.; Olson, Peter J.

    2005-05-01

    The eleven universities of the State University System of Florida (SUS-FL) have established a consortium to address the full range of homeland security and domestic preparedness requirements for both Florida and the U.S. The Consortium has established the Florida Homeland Security Institute to provide an effective and efficient mechanism to coordinate, mobilize, combine, and form into teams the diverse, cross-disciplinary expertise, facilities, and established large base of technology development activities within the SUS-FL institutions and their established associates at industrial companies, governmental labs, and other universities. The Florida Consortium and Institute may provide a model for other state university systems for how to combine established resources effectively to address specific homeland security and domestic preparedness needs. This paper describes the Consortium and Institute goals, structure, and operations, with examples of how it has functioned in its brief existence as an effective mechanism for integrating the wide range of university, industry, and government capabilities within the state for addressing homeland security requirements.

  8. Curriculum Evaluation and Revision in a Nascent Field: The Utility of the Retrospective Pretest-Posttest Model in a Homeland Security Program of Study

    Science.gov (United States)

    Pelfrey, William V., Sr.; Pelfrey, William V., Jr.

    2009-01-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent…

  9. Ethernet-based integrated surveillance system for homeland security and homeland defense

    Science.gov (United States)

    Schooley, Michael G.; Thompson, Dean

    2004-09-01

    This report documents the results of an internal DRS effort to develop an Ethernet based integrated defense system to improve defense of cities, harbors, airports, power production, energy supplies, bridges, monuments, dams and so forth. Results of the integration of multiple SCOUT LPI radars and multiple Electro-optical targeting systems will be provided, illustrating the benefits of interfacing surveillance radars with imaging sensors to confirm detection and provide visual recognition and identification. An analysis of the handover errors will be provided including errors due to; sensor platforms location and orientation uncertainty, target location measurement errors, data latency and motion prediction errors, which contribute to target handoff and the re-acquisition timeline. These predictions will be compared to measured results. The system architecture will be defined including; security, support for both stationary and moving sensor platforms, remote control of sensor systems and distribution of imagery through the network and remote diagnostics, maintenance and software upgrades. Growth capabilities include secure wireless communication to/from moving platforms, integration with sonar and seismic sensors, cooperative location of friendly forces and acoustic detection and triangulation of gunshots with automated cueing of sensors and security forces to the shooters most probable location. The use of ad hoc multi-hopping wireless networking supplements hardwire networks, augments disaster response capabilities, provides high-speed communications for moving platforms and supplements GPS outage areas.

  10. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  11. DHS Workshop -- Homeland Security: New Challenges for Decision Making Under Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, R; Edmunds, T; Howarth, S

    2004-02-20

    A workshop addressing the decision-making challenges confronted by the United States Department of Homeland Security (DHS) in the face of large uncertainties, complex value systems, and multiple stakeholders was held November 13-14, 2003, in Washington, D.C. Forty-six participants drawn from the DHS, other government agencies, universities, national laboratories, and the private sector attended the workshop. The goals were: (1) to develop a common understanding of the range of decisions DHS program elements must make; (2) to review selected examples of decision processes and approaches used by other organizations for similarly complex problems; and (3) to recommend steps DHS can take to ensure high quality decision making. The workshop brought together diverse perspectives on decision making in the context of complex risks. Participants included those who must make decisions affecting homeland security, those who have faced risky decisions in other domains, and those who have developed theoretical and practical approaches to high quality decision-making. The workshop was sponsored by the Science & Technology (S&T) Directorate, but was intended to address issues of concern to the three DHS operating directorates as well as S&T. The purpose of this breadth was to identify areas in which S&T capabilities and resources could be valuable to DHS as a whole. The workshop consisted of three main segments: (1) Presentations by managers from DHS Directorates, reflecting the diverse nature of decision making across DHS; (2) Presentations on four alternative approaches used to address problems in both government (counter-terrorism R&D investment; identification of critical capabilities in bioterrorism) and the private sector (corporate strategy development; terrorism insurance); and (3) Breakout groups chartered to identify barriers and propose actions to address them, in each of five decision classes: (1) Portfolio management; (2) Grant allocation; (3) Critical one

  12. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... NICCS Portal is a national online resource for cybersecurity awareness, education, talent management... following Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review and... Security Management Act of 2002 (FISMA), 44 U.S.C. 3546; Homeland Security Presidential Directive (HSPD)...

  13. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    Science.gov (United States)

    2015-12-01

    case study of the United Kingdom’s grant allocation approach provides a comparative analysis for DHS funding. Components of the UK’s allocation...the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2015...38 V. UNITED KINGDOM CASE STUDY ................................................................41 A. UNITED KINGDOM APPROACH

  14. Management of the Severely Mentally Ill and Its Effects on Homeland Security

    Science.gov (United States)

    2011-09-01

    Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from...waiting. Gang and graffiti calls Public Intoxication calls, some of which may be a result of the mentally ill. The process the go through when dealing

  15. Integrating Local Public Health Agencies into the Homeland Security Community

    Science.gov (United States)

    2007-03-01

    public health needs that require attention (such as poor prenatal health, teen pregnancy , and sexually transmitted diseases) it is not difficult to...Security objectives. It also assumes that war and terrorism are the sole results of poor health, nutrition , and housing, while ignoring other

  16. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  17. Defense and Homeland Security Applications of Multi-Agent Simulations

    Science.gov (United States)

    2007-12-01

    Monterey, CA 93943-5219, U.S.A. Felix Martinez Wargaming Department Centro de Estudios Superiores Navales Mexico, D.F. 04840, MEXICO Lisa R...critical asset, Petroleos Mexicano (PE- MEX) and the Mexican Navy maintain mutually supportive security strategies in the Campeche Sound. During a state of

  18. Achieving Homeland Security in a Time of Diminishing Resources

    Science.gov (United States)

    2012-06-08

    Kristine L. Shelstad, “The Domestic Security Command–The Evolution of the U.S. Northern Command” (Master’s Thesis, Naval Postgraduate School, Monterrey , CA...through the use of economic, diplomatic, military, and political power. 59 BIBLIOGRAPHY Books Turabian, Kate L. A Manual for Writers of Term

  19. Homeland security R&D roadmapping : risk-based methodological options.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  20. Interagency Collaboration Challenges Among Homeland Security Disciplines in Urban Areas

    Science.gov (United States)

    2006-03-01

    Strategic National Stockpile SPD Seattle Police Department SPOC Seattle Police Operations Center SWAT Special Weapons and Tactics xix TCL Target...established a command post at their Seattle Police Operations Center ( SPOC ) and not at the incident site. The SPOC is a secure police facility and its choice...https://www.chds.us/public.php?met. Christopher Bellavita, online class forum discussion with the author, January, 2006, https://www.chds.us/ courses

  1. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    Science.gov (United States)

    2009-09-01

    Thesis Advisor Glen Woodbury Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iv THIS PAGE...Barry Berman and Joel R. Evans define gap analysis as the tool that “Enables a company to compare its actual performance against its potential...Management: A Strategic Approach 7/E, Barry Berman and Joel R Evans,” Prentice Hall, http://www.prenhall.com/rm_student/html/start.html (accessed

  2. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors ...magazine-feature-article-september-2014. pdf ?sfvrsn=2, 12. 2 “Copper Theft Threatens U.S. Critical Infrastructure,” Federal Bureau of Investigation...www.nerc.com/files/6_Dabdoub_10-20_v2. pdf . 10 Jasvir Gill, Continuous Monitoring: A New Approach to Secure Critical Infrastructure (Atlanta, GA: North

  3. Homeland Security: Implications for Information Policy and Practice--First Appraisal.

    Science.gov (United States)

    Feinberg, Lotte E.

    2002-01-01

    Discusses information policy in the wake of the September 11 terrorist attacks. Topics include access to government records, including Freedom of Information Act issues; removing or expanding information on government Web sites; state actions; coordination versus secrecy in homeland security; and patterns and trends in federal and state…

  4. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... (OPS), including the National Operations Center (NOC), proposes to establish a new DHS system of... Fusion System of Records.'' This system of records will allow DHS/OPS, including the NOC, to collect... natural disasters. The NOC serves as the nation's homeland security center for information sharing...

  5. 75 FR 32723 - Revision of Department of Homeland Security Acquisition Regulation; Limitations on Subcontracting...

    Science.gov (United States)

    2010-06-09

    ... National Operations Center (NOC), through the National Response Coordination Center (NRCC), coordinates the... the National Operations Center (NOC). Requests include a summary of the situation, types and amount of..., the Secretary of Homeland Security issues an operations order to the NOC. The NOC, through the...

  6. Citizenship and Terrorism: The Significance of a Pathway to Citizenship on Homeland Security

    Science.gov (United States)

    2014-03-01

    question: How would providing a pathway to citizenship for the illegal immigrant population of the United States affect homeland security with respect to... illegal immigrant , and non- immigrating foreigner. An analysis of terrorism defined by the categories of citizenship status and estimated population...domestic terrorism. 14. SUBJECT TERMS Citizenship, terrorism, comprehensive immigration reform, illegal immigrant , pathway to citizenship

  7. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or...

  8. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ... Protection-003 Credit/Debit Care Data System of Records'' and this proposed rulemaking. In this proposed...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Care...

  9. The National Guard -- DOD’s Logical Homeland Security "First Responder" for the 21st Century

    Science.gov (United States)

    2005-01-01

    Virginia 22134-5068 FUTURE WAR PAPER TITLE: THE NATIONAL GUARD – DOD’S LOGICAL HOMELAND SECURITY “ FIRST RESPONDER ” FOR THE 21ST...INCLUDE THE FOREGOING STATEMENT. EXECUTIVE SUMMARY TITLE: THE NATIONAL GUARD – DOD’S LOGICAL HOMELAND SECURITY “ FIRST RESPONDER ” FOR THE 21ST

  10. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of... Administration--011 Transportation Security Intelligence Service Operations Files previously published on... Security Intelligence Service (TSIS) Operations Files System of Records (69 FR 71828, December 10,...

  11. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  12. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of cybe

  13. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of

  14. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  15. An Agent-Based Approach for Data Fusion in Homeland Security

    Directory of Open Access Journals (Sweden)

    Rafael de Solís Montes

    2013-09-01

    Full Text Available This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem is to process such amounts of data in order to provide useful information. We have to focus our effort on developing intelligent information systems able to handle big amounts of data extracting or revealing relations among data and able to produce information easily understandable for the human user. That is the case of data fusion in tactical operations, especially in the field of defense and Homeland security. Our research is focused on obtaining a Multi-agent system able to inference future enemy’s actions or behaviors from data received from heterogeneous sensors.

  16. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    Science.gov (United States)

    2009-03-01

    effectively. One of the primary functions of the GRT is to provide DHS with an electronic database to query in the event of a Congressional data call. In...we need an easy to ready catalog/ database of what resources (physical and non-physical) are available at the federal, state, regional, and local...Local Performance Regimes for Homeland Security.” Review of Policy Research 23, no. 1 (2006). Business Source Complete, EBSCOhost (accessed December 30

  17. Mission Command: Retooling the Leadership Paradigm for Homeland Security Crisis Response?

    Science.gov (United States)

    2015-03-01

    can be implemented by a homeland security organization. Fatal fires, such as 344 Francis Fukuyama , “America in Decay: The Sources of Political...Dysfunction,” Foreign Affairs (September–October 2014), accessed February 7, 2015, http://www.foreignaffairs.com/articles/141729/ francis - fukuyama /america...Bismark to Hitler, The Von Moltke Family’s Impact on German History. New York, Harper Collins, 1995. Fukuyama , Francis . “America in Decay: The

  18. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    Science.gov (United States)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  19. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    intergovernmental relations by using network theory means that the system should be based on linkages and interrelationships, rather than...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some... theory tells us that every relay doubles the noise and cuts the message in half. Also, change leadership requires the willingness and ability to change

  20. Formal Critiques and After Action Reports from Conventional Emergencies: Tools for Homeland Security Training and Education

    Science.gov (United States)

    2010-09-01

    Exercise Evaluation Guide EMS Emergency Medical Services HSEEP Homeland Security Exercise and Evaluation Program IAP Incident Action Plan IP...must not be dumped from the pedagogical learning model used primarily for childhood education into an andragorical model without orientation on how...reporting an explosion at a food processing plant is received. The initial responding companies confirm the report and identify the source of the

  1. The DoD Role in Homeland Security: Past, Present, and Future

    Science.gov (United States)

    2013-03-01

    specifically chartered to address homeland security was the Council of National Defense ( CND ). The CND was established as an emergency agency by...responsibilities to state governments. On April 9, 1917, the CND chairman requested all Governors establish councils of defense.9 The armistice of 1918 prompted...councils to disband and CND operations were suspended on June 30, 1921.10 A parallel pattern emerged during World War II. Most wartime

  2. Of Nasa and Neanderthals, Elephants and Machines: Metaphors and the Conceptualization of Homeland Security

    Science.gov (United States)

    2013-12-01

    favor of the pursuit of knowledge. Charles Darwin , genius though he was, was not a sharp mathematician183 but had he been so, he would have realized...is crucial since, as Charles Darwin understood, selection as the instrument for evolution can only work if there are different characteristics from... Charles Darwin Can Teach Tom Ridge about Homeland Security,” Foreign Policy (September–October 2003): 69. 292. Johanson and Wong, Lucy’s Legacy, 248. 293

  3. Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter

    Science.gov (United States)

    2007-06-01

    Bringing HPC to the First Responder and Warfighter DISTRIBUTION: Approved for public release, distribution unlimited This paper is part of the following...thru ADP023803 UNCLASSIFIED Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter Gopal Patnaik and...Urban AerodynamicsE1 3, these models are now the fidelity and accuracy of CFD to the first responder or commonly applied to predict contaminant

  4. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-08

    ... race, ethnicity, or religion, by employees and officials of the Department of Homeland Security. The.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it);...

  5. Enabling private and public sector organizations as agents of homeland security

    Science.gov (United States)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  6. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    Science.gov (United States)

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  7. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  8. Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.

    Science.gov (United States)

    Omer, Saad B; Barnett, Daniel J; Castellano, Cherie; Wierzba, Rachel K; Hiremath, Girish S; Balicer, Ran D; Everly, George S

    2007-01-01

    The Homeland Security Advisory System (HSAS) was established by the Department of Homeland Security to communicate the risk of a terrorist event. In order to explore the potential psychological impacts of HSAS we analyzed the effects of terror alerts on the law enforcement community. We used data from the New Jersey Cop 2 Cop crisis intervention hotline. Incidence Rate Ratios--interpreted as average relative increases in the daily number of calls to the Cop 2 Cop hotline during an increased alert period--were computed from Poisson models. The hotline received a total of 4,145 initial calls during the study period. The mean daily number of calls was higher during alert level elevation compared to prior 7 days (7.68 vs. 8.00). In the Poisson regression analysis, the Incidence Rate Ratios of number of calls received during elevated alert levels compared to the reference period of seven days preceding each change in alert were close to 1, with confidence intervals crossing 1 (i.e. not statistically significant) for all lag periods evaluated. This investigation, in the context of New Jersey law enforcement personnel, does not support the concern that elevating the alert status places undue stress upon alert recipients.

  9. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  10. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ... Transportation Security Administration. Information in this system also includes records related to the... occurred during passenger or property screening would be covered by this system. Portions of this system... information system of records has been compromised. Another routine use permits the release of information to...

  11. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    Science.gov (United States)

    2011-12-01

    Administration NEN NASA Engineering Network NISAC National Infrastructure Simulation and Analysis Center NPIA National Policing Improvement... cognitive dimension,” “…of mental models, beliefs, and perspectives so ingrained that we take them for granted, and therefore cannot easily...tacit knowledge and experience through mentoring and apprenticeship on decades long projects. Time and budget pressures, along with an expanded array

  12. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  13. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    outlines a holistic community preparedness approach to securing the nation. “The national preparedness system shall be designed to help guide the domestic...failed its first test.”40 As the horror of Hurricane Katrina was being witnessed globally, so too was the issue of leadership, specifically, who was in...have impacted multiple in-groups to include patriotic Bostonians, concerned Muslim-Americans, and those who felt the need to revisit the horror of 9

  14. 76 FR 24901 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-002...

    Science.gov (United States)

    2011-05-03

    ... Homeland Security's inventory of record system. DATES: Submit comments on or before on or before June 2... contain Department of Transportation-required Substance Abuse evaluations and USCG Sexual Abuse Prevention... software tools which ensure the protection of the confidential information by making reconstruction...

  15. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... us. DHS will disclose two separate data files through a computer matching operation for our use in... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... an existing computer matching program that will expire on July 18, 2012. SUMMARY: In accordance...

  16. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... unintended changes this action makes in DHS policies and procedures for drug-free workplaces. All comments or.... Adopting the OMB guidance in place of the common rule will not substantively change the drug-free workplace... Implementation of OMB Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS...

  17. Introducing the Future Now: Using Memetics and Popular Culture to Identify the Post-9/11 Homeland Security Zeitgeist

    Science.gov (United States)

    2008-03-01

    becoming an increasingly “ hieroglyphic civilization.”37 This characterization is even more appropriate today. Ann Marie Seward Barry argues that we live...original official purpose to become a hieroglyphic with rich cultural meaning. No other meme related to homeland security has permeated our popular

  18. Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

    2009-06-17

    Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

  19. A Radiation Homeland Security Workshop Presented to the City of Berkeley Fire Department

    Science.gov (United States)

    Matis, Howard

    2005-04-01

    A radiation incident in a community, ranging from a transportation accident to a dirty bomb, is expected to be rare, but still can occur. First responders to such an incident must be prepared. City of Berkeley officials met with members of the Lawrence Berkeley National Laboratory staff and agreed that the laboratory participants would create material and teach it to all of their fire fighting staff. To design such a course, nuclear physicists, biologists and health physicists merged some of their existing teaching material together with previous homeland security efforts to produce a course that lasted one full day. The material was designed to help alleviate the myths and fear of radiation experienced by many first responders. It included basic nuclear physics information, biological effects, and methods that health physicists use to detect and handle radiation. The curriculum included several hands on activities which involved working directly with the meters the Berkeley Fire Department possessed. In addition, I will discuss some observations from teaching this course material plus some unusual problems that we encountered, such as suddenly the whole class responding to a fire.

  20. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  1. Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system

    Science.gov (United States)

    Antony, Richard T.; Karakowski, Joseph A.

    2010-04-01

    A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.

  2. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  3. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  4. An Examination of Four Successes in the Coast Guard’s Innovation Program and Implications for Innovation within Homeland Security

    Science.gov (United States)

    2008-03-01

    Elixir guitar strings, and approximately 1,000 other products .32 Prior to founding Gore and Associates, Bill Gore spent seventeen years working for...and local government agencies, and private entities supporting government homeland security operations. The product of this research is an analysis...literature conveys when it calls innovation: The creation, development and implementation of a new product , process or service, with the aim of

  5. The Homeland Security Ecosystem: An Analysis of Hierarchical and Ecosystem Models and Their Influence on Decision Makers

    Science.gov (United States)

    2012-12-01

    Gail F. Thomas, and Erik Jansen , “Building Collaborative Capacity: An Innovative Strategy for Homeland Security Preparedness,” in Advances in...Intelligence Analysis (Washington DC: CQ Press, 2011), 123. 184 Ropert Bood and Theo Postma, “Scenario Analysis as a Strategic Management Tool” (Groningen...World Mirrors Life of Ecosystems.” Computer Reseller News (February 1996): 36. Bood, Ropert and Theo Postma. “Scenario Analysis as a Strategic

  6. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  7. Curriculum evaluation and revision in a nascent field: the utility of the retrospective pretest--posttest model in a homeland security program of study.

    Science.gov (United States)

    Pelfrey, William V; Pelfrey, William V

    2009-02-01

    Although most academic disciplines evolve at a measured pace, the emerging field of homeland security must, for reasons of safety and security, evolve rapidly. The Department of Homeland Security sponsored the establishment of a graduate educational program for key officials holding homeland security roles. Because homeland security is a nascent field, the establishment of a program curriculum was forced to draw from a variety of disciplines. Curriculum evaluation was complicated by the rapid changes occurring in the emerging discipline, producing response shift bias, and interfering with the pre-post assessments. To compensate for the validity threat associated with response shift bias, a retrospective pretest-posttest evaluative methodology was used. Data indicate the program has evolved in a significant and orderly fashion and these data support the use of this innovative evaluation approach in the development of any discipline.

  8. The Danish Perspective on Baltic Security.

    Science.gov (United States)

    1998-01-01

    Brundtland & Don M. Snider, Nordic-Baltic Security: An International Perspective (Washington D.C.: the Center for Strategic & International Studies, 1994...Martin’s Press, c1992), p. 24. 180berg, p. 24-25. 19Arne Olav Brundtland & Don M. Snider, Nordic-Baltic Security: An International Perspective...Oznobistchev, "Russia in its Neighboring Environment: New Challenges and New Policy?" in Arne Olav Brundtland and Don M. Snider (eds.), Nordic-Baltic

  9. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... organizations; domestic security and emergency management officials; and private sector entities or individuals... governments and international organizations; domestic security and emergency management officials; and private... international officials; domestic security and emergency management officials; and private sector...

  10. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  11. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... security threat assessment of law enforcement, immigration, and intelligence databases, including a... agency to perform a security threat assessment. The security threat assessment will be used to identify... ] security threat assessment to identify individuals who present a low risk to transportation security....

  12. Federal Register: The President. Amendment of Executive Orders, and Other Actions, in Connection with the Transfer of Certain Functions to the Secretary of Homeland Security. Part 4

    National Research Council Canada - National Science Library

    Bush, George

    2003-01-01

    Act of 2002 (Public Law 107 296) and section 301 of title 3, United States Code, and in order to reflect the transfer of certain functions to, and other responsibilities vested in, the Secretary of Homeland Security, the transfer...

  13. HOMELAND SECURITY: Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals

    Science.gov (United States)

    2004-05-01

    Office GAO May 2004 HOMELAND SECURITY Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated...Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance Goals 5a. CONTRACT NUMBER 5b...2004 HOMELAND SECURITY Management of First Responder Grants in the National Capital Region Reflects the Need for Coordinated Planning and Performance

  14. Development of neutron/gamma generators and a polymer semiconductor detector for homeland security applications

    Science.gov (United States)

    King, Michael Joseph

    Instrumentation development is essential to the advancement and success of homeland security systems. Active interrogation techniques that scan luggage and cargo containers for shielded special nuclear materials or explosives hold great potential in halting further terrorist attacks. The development of more economical, compact and efficient source and radiation detection devices will facilitate scanning of all containers and luggage while maintaining high-throughput and low-false alarms Innovative ion sources were developed for two novel, specialized neutron generating devices and initial generator tests were performed. In addition, a low-energy acceleration gamma generator was developed and its performance characterized. Finally, an organic semiconductor was investigated for direct fast neutron detection. A main part of the thesis work was the development of ion sources, crucial components of the neutron/gamma generator development. The use of an externally-driven radio-frequency antenna allows the ion source to generate high beam currents with high, mono-atomic species fractions while maintaining low operating pressures, advantageous parameters for neutron generators. A dual "S" shaped induction antenna was developed to satisfy the high current and large extraction area requirements of the high-intensity neutron generator. The dual antenna arrangement generated a suitable current density of 28 mA/cm2 at practical RF power levels. The stringent requirements of the Pulsed Fast Neutron Transmission Spectroscopy neutron generator necessitated the development of a specialized ten window ion source of toroidal shape with a narrow neutron production target at its center. An innovative ten antenna arrangement with parallel capacitors was developed for driving the multi-antenna arrangement and uniform coupling of RF power to all ten antennas was achieved. To address the desire for low-impact, low-radiation dose active interrogation systems, research was performed on mono

  15. Software Security Rules: SDLC Perspective

    Directory of Open Access Journals (Sweden)

    S. K. Pandey

    2009-10-01

    Full Text Available Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email & e-greetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of people’s trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, ‘right from the beginning’. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.

  16. China’s Security Perspective

    Science.gov (United States)

    2011-06-01

    Harold A. Trinkunas, PhD Chair , Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The current...67–103. 14 Dennis Blair, John Handley, “From Wheels to Webs: Reconstruction Asia-Pacific Security Arrangements” The Washington Quarterly (2001), 7...professional basketball player during a game, China’s military acquisition program is only part of its overall modernization program and poses little threat

  17. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Science.gov (United States)

    2012-11-02

    ... responding to natural disasters to preventing terrorism, by utilizing diverse perspectives, skills, tools... its operating protocols, in consultation with the Office of Management and Budget; (ii) establish...

  18. Groupthink: A Significant Threat to the Homeland Security of the United States

    Science.gov (United States)

    2014-12-01

    news/blogs/ ken - walshs-washington/2012/10/31/a-tale-of-two-storms-comparing-bush-and-obamas-hurricane-response. 142 Morton, Next–Generation Homeland... Wilber , “Dress Code Relaxed for Air Marshals,” Washington Post, August 25, 2006, http://www.washingtonpost.com/wp-dyn/content/article/2006/08/24...Koresh had told him that he knew the raid was imminent.235 According to BATF Special Agent Ken King, no alternative plan for peacefully serving the

  19. 77 FR 12606 - Homeland Security Academic Advisory Council; Establishment and Meeting

    Science.gov (United States)

    2012-03-01

    ... recruitment; international students; ] academic research; campus and community resiliency, security and... time of appointment by Department ethics officials. Individuals appointed for their expertise would be... committee has completed its business. ADDRESSES: The meeting will be held at the Ronald Reagan...

  20. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ..., Security and Authentication, and Network Evolution working groups. A more detailed agenda will be released... Commission will also provide audio and/or video coverage of the meeting over the Internet from the FCC's...

  1. Historical Perspectives on Diaspora Homeland Tourism: "Israel Experience" Education in the 1950s and 1960s

    Science.gov (United States)

    Kelner, Shaul

    2013-01-01

    Homeland tourism is a powerful medium of diasporic education. Yet, efforts to understand the enterprise are hampered by neglect of the field's history. This article contributes to the historiography of diaspora homeland tourism by examining the emergence of American Jewish educational tours of Israel in the 1950s and 1960s. Archival research and…

  2. Historical Perspectives on Diaspora Homeland Tourism: "Israel Experience" Education in the 1950s and 1960s

    Science.gov (United States)

    Kelner, Shaul

    2013-01-01

    Homeland tourism is a powerful medium of diasporic education. Yet, efforts to understand the enterprise are hampered by neglect of the field's history. This article contributes to the historiography of diaspora homeland tourism by examining the emergence of American Jewish educational tours of Israel in the 1950s and 1960s. Archival research and…

  3. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  4. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  5. 76 FR 63206 - Supplemental Standards of Ethical Conduct for Employees of the Department of Homeland Security

    Science.gov (United States)

    2011-10-12

    ... (DAEO) to manage and coordinate the ethics programs within the Department's components and offices. B... by the DHS DAEO to manage and coordinate the ethics programs within the DHS components pursuant to... (FEMA); (2) Federal Law Enforcement Training Center; (3) Transportation Security Administration;...

  6. Homeland Security Department: FY2011 President’s Request for Appropriations

    Science.gov (United States)

    2010-04-15

    program, the National Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.87 Dr. Alexander G. Garza... Biosurveillance Integration Center; and the Rapidly Deployable Chemical Detection System.88 Issues for Congress BioWatch: Effectiveness and Deployment...20 23 Systems Acquisition 20 61 Radiation Portal Monitoring Program - 8 Securing the Cities 20 - Human Portable Radiation Detection

  7. 2010 Homeland Security Symposium and Exhibition Held in Arlington, Virginia on September 28-29, 2010

    Science.gov (United States)

    2010-09-29

    Animal Disease A dynamic disaster environment Got Security? More Public/Private Up-Front Interaction “Recommendation: That the President direct the...movement of materials We provide hope and help around the world. Earthquake in China © Matthew Marek , Red Cross © Matthew Marek , Red Cross © Matthew... Marek , Red Cross Phases of a Disaster • Rescue • Response • Recovery • Rebuilding Phases of a Disaster • Rescue • Response • Recovery • Rebuilding The

  8. Rethinking Merida’s Priorities: The Time is Now to Invest in Homeland Security

    Science.gov (United States)

    2011-10-28

    Development Assistance (DA) to support domestic poverty reduction and maximize economic benefit from NAFTA . Congress, for example, increased FY 2011 DA to...border with Canada , the Great Lakes region, or American cities like New York or Los Angeles, where drugs enter the United States. Sufficiently...investment and, more importantly, is in the collective security interests of North America. Mexican drug cartels profit off criminal trade in both Canada

  9. Measuring Boston’s Security Investment: Methods and Tools to Assess Homeland Security Initiatives. Policy Analysis Exercise

    Science.gov (United States)

    2009-03-31

    recommendations for MOEP as they move forward in developing a performance management system: (1) Implement a Balanced Scorecard approach; (2) Focus on...performance management systems, particularly those measuring preparedness and security -- we determined that the Balanced Scorecard is the most practical, applicable, and sustainable solution for MOEP.

  10. Combating Terrorism in the Philippines to Improve U.S. Homeland Security

    Science.gov (United States)

    2010-12-01

    March 1998): 43. 15 As a result, the Spanish branded them with the “Moro” label, taken from their wars with Spanish Muslims, the Moors.28 The...regional government.87 The largest point of contention from the MILF’s perspective remains the Memorandum of Agreement on Ancestral Domain (MoA-AD...The Evolving Terrorist Threat to Southeast Asia: A Net Assessment,” 87. 105 Ibid., 89–90. 106 Ibid., 94. 29 took the bombings in Bali in

  11. US public perspectives on security

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale [Univ. of Oklahoma, Norman, OK (United States); Jenkins-Smith, Hank C. [Univ. of Oklahoma, Norman, OK (United States); Silva, Carol L. [Univ. of Oklahoma, Norman, OK (United States)

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  12. US public perspectives on security :

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  13. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  14. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    security procedures, encouraging their followers to attack the global transportation system.15 The consequences of these attacks are not just the visual ...partnerships for DHS.31 Though this argument is sound , the author only reviews a few programs, and does not acknowledge the broader DHS capability nor its...Capacity Development,”2. 89 Neil A. Englehart, “State Capacity, State Failure, and Human Rights,” Journal of Peace Research 46, no. 2 (2009): 163

  15. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, James [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Shedlock, Daniel [Varian Medical Systems, Inc., Palo Alto, CA 94304 (United States). Imaging Lab.; Langeveld, Willem G.J. [Rapiscan Laboratories, Inc., Sunnyvale, CA 94085 (United States); Bharadwaj, Vinod [SLAC National Accelerator Lab., Menlo Park, CA (United States); Nosochkov, Yuri [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2015-08-07

    In the security and inspection market, there is a push towards highly mobile, reduced-dose active interrogation scanning and imaging systems to allow operation in urban environments. To achieve these goals, the accelerator system design needs to be smaller than existing systems. A smaller radiation exclusion zone may be accomplished through better beam collimation and an integrated, x-ray-source/detector-array assembly to allow feedback and control of an intensity-modulated x-ray source. A shaped low-Z target in the x-ray source can be used to generate a more forward peaked x-ray beam. Electron-beam steering can then be applied to direct the forward-peaked x rays toward areas in the cargo with high attenuation. This paper presents an exploratory study to identify components and upgrades that would be required to meet the desired specifications, as well as the best technical approach to design and build a prototype.

  16. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  17. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    Science.gov (United States)

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  18. XGraphticsCLUS: Web Mining Hyperlinks and Content of Terrorism websites for Homeland Security

    Directory of Open Access Journals (Sweden)

    Dr.S.K.Jayanthi

    2011-05-01

    Full Text Available World Wide Web has become one of the best and fast communication media and information could be distributed within few seconds to the world day by day. The evolution of social networking media increases it further more to transfer information in a rapid speed to common people. Terrorism organizations utilize these facets of the web in very efficient manner for their destructive plans. Understanding web data is a decisive task to assure the better perceptive of a website. This paper focuses on the content and link structure mining of the website which was suspicious through XGraphticsCLUS. This is done through viewing the web as graph and retrieving the various content of the website. This could help in terms of better understanding the motto and various other web connections in the suspicion. The navigational links offered in the particular website could leave with some informative evidence. This paper puts a step towards the national security and provides the user a good perception.

  19. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  20. Using DOD ISR Capabilities in Support of Homeland Security and Defense; Policy Challenges and Considerations for Effective Incident Awareness and Assessment

    Science.gov (United States)

    2011-03-01

    CONOPS) that gives a brief overview of active duty and National Guard capabilities and processes for responding to homeland security contingencies...fire and the worst oil pollution disaster in history (James, 2010). More than 205 million gallons of raw crude oil are estimated to have gushed into...pertain to the employment of DoD airborne assets for DSCA missions. The DSCA Air Support Handbook provides an overview of the full spectrum of DoD

  1. Changing Napoleonic Leadership In The Department Of Homeland Security: The Identification Of Toxic Leadership Behaviors And How To Facilitate Change To Those Behaviors

    Science.gov (United States)

    2016-02-06

    negative workforce behaviors, and how it correlates to practices within the US Department of Homeland Security (DHS) and US Customs and Border...aspects: sociability , self-control, well-being, and emotionality.”30 10 Table 1. Models of Emotional Intelligence31 As illustrated above, many of...program is designed to provide basic knowledge, practical skills, and tools needed to successfully manage supervisory responsibilities and challenges

  2. It-security seen from a user experience perspective

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    The workshop will explore the possibilities of a user-centered perspective on security. With exceptions, existing research may be criticized for being highly system-centered, focusing on how one may change user behavior to deal with the requirements of security, or on how security aspects can be ...

  3. Homeland Security Interagency Support. (Joint Center for Lessons Learned Quarterly Bulletin. Volume 4, Issue 2, March 2002)

    Science.gov (United States)

    2002-03-01

    U.S. Capitol, the White House, and nuclear power facilities. In the United States and Europe, Disney amusement parks are likely targets. In Britain, the...appropriate when such attacks will involve small bands of individuals engaged in criminal acts within our homeland instead of stereotyped conventional

  4. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    Science.gov (United States)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  5. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  6. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    .... eNOAD information includes complete name, date and place of birth, gender, country of citizenship... security, maritime law enforcement, marine environmental protection, and other related purposes....

  7. Relay Placement for Physical Layer Security: A Secure Connection Perspective

    CERN Document Server

    Mo, Jianhua; Liu, Yuan

    2012-01-01

    This work studies the problem of secure connection in cooperative wireless communication with two relay strategies, decode-and-forward (DF) and randomize-and-forward (RF). The four-node scenario and cellular scenario are considered. For the typical four-node (source, destination, relay, and eavesdropper) scenario, we derive the optimal power allocation for the DF strategy and find that the RF strategy is always better than the DF to enhance secure connection. In cellular networks, we show that without relay, it is difficult to establish secure connections from the base station to the cell edge users. The effect of relay placement for the cell edge users is demonstrated by simulation. For both scenarios, we find that the benefit of relay transmission increases when path loss becomes severer.

  8. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Security Administration, TSA-1, FOIA Division, 400 Seventh Street, SW., Washington, DC 20590 3. United... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... follows: A. Former components of the Department of Agriculture: 1. Animal and Plant Health...

  9. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    .../FBI-019 Terrorist Screening Records System of Records (August 22, 2007, 72 FR 47073) Exemptions... System of Records (August 22, 2007, 72 FR 47073) in order to automate and simplify the current method for... (May 19, 2010, 75 FR 28046); (2) TSA, Secure Flight Program: DHS/TSA-019 Secure Flight Records...

  10. 77 FR 47415 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2012-08-08

    ... added two new sources of records: (1) Customer Profile Management System (CPMS) for biometric... Country of Issuance (COI) Visa number Social Security Number (in very limited circumstances using the Form...) Country of birth Class of admission code File control office code Social Security Number I-94 number...

  11. 76 FR 58525 - Privacy Act of 1974; Department of Homeland Security, U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-21

    ..., Form G-845, if appropriate. Although SAVE may receive a Social Security Number (SSN) from its... Exchange Visitor Identification System (SEVIS) ID, foreign passport number, visa number, social security...), Customer Profile Management System (CPMS), Student and Exchange Visitor Identification System (SEVIS...

  12. Current Cloud Computing Security Concerns from Consumer Perspective

    Institute of Scientific and Technical Information of China (English)

    Hafiz Gulfam Ahmad; Zeeshan Ahmad

    2013-01-01

    In recent years cloud computing is the subject of extensive research in the emerging field of information technology and has become a promising business.The reason behind this widespread interest is its abilityto increase the capacity and capability of enterprises,having no investment for new infrastructure,no software license requirement and no need of any training. Security concern is the main limitation factor in the growth of this new born technology.The secur-ity responsibilities of both,the provider and the consumer greatly differ between cloud service models.In this paper we discuss a variety of security risks,authentication issues,trust,and legal regularity in cloud environment with consumer perspective.Early research focused only on techni-cal and business consequences of cloud computing and ignored consumer perspective.There-fore,this paper discusses the consumer security and privacy preferences.

  13. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  14. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  15. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  16. The Wicked Problem of Information Sharing in Homeland Security - A Leadership Perspective

    Science.gov (United States)

    2014-06-01

    SLTTP?  Organizational sensibilities —How to ensure that the meta-leader recognizes the traditional Newtonian linear aspects of organizations and is...reform. Analysts detailed to the NCTC for a little as one year could wait for weeks or months to regain access to their own system.175 One analyst...while offering the data that can free Americans to concentrate on more productive and sensible safety measures is admirable. Their work puts

  17. 78 FR 20680 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-04-05

    ...; Divorce Certificates; Explanatory Statements; Unsolicited information submitted voluntarily in support of...); Employment Information; Financial Information; Position and Relationship to an Organization; Family... security awareness training to all information system users (including managers, senior executives,...

  18. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... will have rights to run ad hoc reports and query data as it relates to quality assurance tracking and... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  19. Human Insecurity: Understanding International Migration from A Human Security Perspective

    Directory of Open Access Journals (Sweden)

    Francesca Vietti

    2013-07-01

    Full Text Available This article examines contemporary, mass migration from the perspective of human security. It tracks the development of the human security model of international relations, and compares it to the well-established state security model that has served as the dominant paradigm for international relations since the seventeenth century. The article argues that human security offers a more effective approach to many of the underlying problems and threats associated with mass migration, than does the traditional state-security model.  It challenges national and international authorities to address threats to human security, in order to minimize forced migration and to create the conditions for migration by choice, not necessity.

  20. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ... Presidential Directive--12 program, directing the use of a common identification credential for both logical... a National Special Security Event; and record source categories has been updated to include records...Gate System; (4) Automated Continuing Evaluation System (ACES) Pilot; (5) Personal Identity...

  1. 76 FR 60070 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel..., address, organization, e-mail, phone number, relation, paid/unpaid). Signature (electronic or scanned..., debts, encumbrances, etc.). Social Security Number (SSN), if applicable. Supporting documentation...

  2. 76 FR 60063 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2011-09-28

    ... Immigration Services-014 Electronic Immigration System- 1 Temporary Accounts and Draft Benefit Requests System....S. Citizenship and Immigration Services-014 Electronic Immigration System-1 Temporary Accounts and... Security/U.S. Citizenship and Immigration Services to collect and maintain records on an individual as...

  3. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... provided in the SCSP is a narrative description of the procedures the applicant business uses to adhere to each C-TPAT Security Criteria or Guideline articulated for their particular business type (importer... the subject of the inquiry could also permit the subject to avoid detection or apprehension....

  4. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    and a related abstract titled “Distributed preparedness: the spatial logic of domestic security in the United States” (Collier & Lakoff , 2008...hurricanes, earthquakes, and floods. The result of this evolution created a new field of expertise called “emergency management” (Collier & Lakoff , 2008...Collier and Lakoff examined two dimensions of distributed preparedness— emergency federalism and vulnerability mapping—to assess their

  5. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ...; violations of the confidentiality provisions of the Violence Against Women Act; conditions of detention... Transportation Security Administration (TSA) records and functions; and to the news media in the interest of the..., or other benefit. P. To the news media and the public, with the approval of the Chief Privacy...

  6. 78 FR 57402 - Privacy Act of 1974; Department of Homeland Security/U.S. Customs and Border Protection-019 Air...

    Science.gov (United States)

    2013-09-18

    .... 1101, et seq., including 8 U.S.C. 1103, 1225, and 1324; the Illegal Immigration Reform and Immigrant..., AMOSS has users from various DHS components including the U.S. Immigration and Customs Enforcement (ICE... to know the information to carry out national security, law enforcement, immigration,...

  7. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... and the intelligence landscape. However, the use of ATS is governed by a number of policy and... rules in ] ATS, which are based on current intelligence or past case experience. Travelers may also be... Identity Theft: A Strategic Plan'' at http://www.identitytheft.gov ) to address security breaches...

  8. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... resources; Date and time of access; Logs of activity of DHS IT resources; IP address of access; Logs of... to the Department that is derived from other sources to facilitate authorized access to DHS... General Information Technology Access Account Records system of records security protocols will...

  9. Quantitative Safety and Security Analysis from a Communication Perspective

    Directory of Open Access Journals (Sweden)

    Boris Malinowsky

    2015-12-01

    Full Text Available This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real-time communication protocol for safety-critical scenarios, we can rely on the protocol’s individual safety and security properties. The resulting communication protocol satisfies selected safety and security properties for deployment in safety-critical use-case scenarios with security requirements. We look at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective on the communication protocols. The results are obtained using the network simulator ns-3.

  10. Quantitative Safety and Security Analysis from a Communication Perspective

    DEFF Research Database (Denmark)

    Malinowsky, Boris; Schwefel, Hans-Peter; Jung, Oliver

    2014-01-01

    This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real......-time communication protocol for safety-critical scenarios, we can rely on the protocol’s individual safety and security properties. The resulting communication protocol satisfies selected safety and security properties for deployment in safety-critical use-case scenarios with security requirements. We look...... at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective...

  11. China-ASEAN Security Cooperation in Perspective

    Institute of Scientific and Technical Information of China (English)

    Zheng Xianwu

    2012-01-01

    For years, an obsession with economic cooperation - flee-trade areas in particular - has marginalized research into China-ASEAN security issues. In recent years such issues have become more prominent, albeit so far mostly confined to specific issues such as territorial disputes in the South China Sea.

  12. Rules And A Rubric Could Be Used To Assess The Openness Of A Homeland Security Enterprise Social Network

    Science.gov (United States)

    2016-12-01

    Cybersecurity and Communication Integration Center NPOV neutral point of view I&A intelligence and analysis PCLOB Privacy and Civil Liberties...establish a culture of “need to share” securely while respecting civil rights and privacy. In February 2011, the DHS Office of Intelligence and Analysis ...I&A) issued its strategic plan designed to last through 2018. The plan consisted of four goals, to apply intelligence analysis to understand threats

  13. Suicide Terrorism in America?: The Complex Social Conditions of This Phenomenon and the Implications for Homeland Security

    Science.gov (United States)

    2014-11-05

    AND ABBREVIATIONS CPOST Chicago Project on Security and Terrorism LTTE Liberation Tigers of Tamil Eelam PKK Kurdistan Workers’ Party SIT Social...Kurdistan Workers’ Party ( PKK -Partiy Karkeren Kurdistan) in order to understand whether there is a universal or location-dependent explanation for...where the PKK was “ideologically remote from large segments of the public it sought to represent” and is seen as having failed. The examination of

  14. Effective Selection: A Study of First-Line Supervisor Selection Processes in the Department of Homeland Security

    Science.gov (United States)

    2011-03-01

    survive in a free market economy. Unlike the private sector, the federal government is not concerned about profits and loss and worries less about...all DHS agencies as a strategy to cut down costs associated with implementing best practices for first-line supervisor selection. Additionally, by...U.S. Coast Guard (CG) HSAD U.S. Secret Service (SS) HSBB Immigration and Customs Enforcement (ICE) HSBC Transportation Security Administration (TSA

  15. Transitioning from analog to digital communications: An information security perspective

    Science.gov (United States)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  16. A Perspective on Research Challenges in Information Security

    Science.gov (United States)

    2011-11-01

    Ben Long, Martin Lucas, Paul Montague, Dean Philp , Simon Windows Command, Control, Communications and Intelligence Division Defence Science and...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos, Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp ...UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos

  17. Homeland calling

    DEFF Research Database (Denmark)

    Juul, Kristine

    2007-01-01

    A great deal of those immigrants that settled in Denmark in the 1970s and 1980s have maintained strong bonds to their communities of origin. These bonds play an important role in shaping the identities and in maintaining relationships between migrants in the receiving communities. But while...... on the institutions and practices that act to transmit relations between country of origin and the new homeland. Focus is particularly on the efforts that the Yugoslav and Serbian states have made to maintain migrants political and economic loyalty and on the effects that this has had on migrants perceptions on key...

  18. TRANSNATIONAL ORGANIZED CRIME. AN (INTERNATIONAL SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ionel Stoica

    2016-10-01

    Full Text Available For the past two decades organized crime has become a transnational phenomenon, and its impact is still far from being fully known and understood by common people. Its forms of manifestation, whether explicit, or subtle, are permanently evolving and adapting. As a result, its interference with the activities from the legal area makes it difficult to identify and counteract. After a long period of time when it was more a peripheral phenomenon, current transnational organized crime tends to become a major danger to the political, social and economic stability of the states. Through its nature and goals, as well as through the complexity of its forms of manifestation, transnational organized crime represents a major challenge for the state and nonstate organizations that deal with national and international security This paper focuses on the phenomenon starting from some of the most influent theories in international relations, presents the current features of transnational organized criminal groups and analyzes the causes and the favoring factors of the phenomenon, as well as the impact of the phenomenon upon national and international security at political, economic-financial and military level. The approach is an interdisciplinary one and also covers the nexus between transnational organized crime and international terrorism.

  19. The Level of Europium-154 Contaminating Samarium-153-EDTMP Activates the Radiation Alarm System at the US Homeland Security Checkpoints

    Directory of Open Access Journals (Sweden)

    Mohammed Najeeb Al Hallak

    2009-08-01

    Full Text Available 153Sm-EDTMP is a radiopharmaceutical composed of EDTMP (ethylenediamine-tetramethylenephosphonate and Samarium-153 [1]. 153Sm-EDTMP has an affinity for skeletal tissue and concentrates in areas with increased bone turnover; thus, it is successfully used in relieving pain related to diffuse bone metastases [1]. The manufacturing process of 153Sm-EDTMP leads to contamination with 154Eu (Europium-154 [2]. A previous study only alluded to the retention of 154Eu in the bones after receiving treatment with 153Sm-EDTMP [2]. Activation of the alarm at security checkpoints after 153Sm-EDTMP therapy has not been previously reported. Two out of 15 patients who received 153Sm-EDTMP at Roger Maris Cancer Center (Fargo, N. Dak., USA activated the radiation activity sensors while passing through checkpoints; one at a US airport and the other while crossing theAmerican-Canadian border. We assume that the 154Eu which remained in the patients’ bones activated the sensors. Methods: In order to investigate this hypothesis, we obtained the consent from 3 of our 15 patients who received 153Sm-EDTMP within the previous 4 months to 2 years, including the patient who had activated the radiation alarm at the airport. The patients were scanned with a handheld detector and a gamma camera for energies from 511 keV to 1.3 MeV. Results: All three patients exhibited identical spectral images, and further analysis showed that the observed spectra are the result of 154Eu emissions. Conclusion: Depending on the detection thresholds and windows used by local and federal authorities, the remaining activity of 154Eu retained in patients who received 153Sm-EDTMP could be sufficient enough to increase the count rates above background levels and activate the sensors. At Roger Maris Cancer Center, patients are now informed of the potential consequences of 153Sm-EDTMP therapy prior to initiating treatment. In addition, patients treated with 153Sm-EDTMP at Roger Maris Cancer Center

  20. Mobile Device Security: Perspectives of Future Healthcare Workers.

    Science.gov (United States)

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  1. Design Validation of a {sup 10}B{sub 4}C Coated RSP with Multi-layered structure for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Su Hyun; Kim, Jong Yul; Lee, Joo Hyun; Moon, Mung Kook [KAERI, Daejeon (Korea, Republic of); Lim, Chang Hwy [Korea Research Institute of Ships and Ocean Engineering, Daejeon (Korea, Republic of); Lim, Ki Seo [Myongji University, Yongin (Korea, Republic of)

    2016-05-15

    It is a national priority to prevent radiological threats including radiological terrorism and smuggling nuclear material and devices. For this purpose, many governments and relevant organizations have been exploiting radiation detection technology. Especially, radiation portal monitor (RPM) is a widely used type of radiation detectors when it comes to homeland security and commonly deployed at strategic sites like airports and ports. In the most cases, they could be divided into two types of primary screening and secondary screening. In the latter case, hand-held detectors are mainly used for a closer inspection. On the other hand, RPMs for the primary screening, our concern, are stationary mounted type and comprise gamma-ray detector and neutron detector in many cases. The expected performance of the design of a RSP(Radiation Sensor Panel) has been demonstrated. According to the results of the simulation, three RSPs should be needed to meet the criterion mentioned in subsection 2.1. The design still can be validated when taking into account that the geometrical acceptance will be increased since it has been planned that the RPM is going to installed with four RSPs.

  2. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  3. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data

  4. Book Review: The Political Economy of Work Security and Flexibility. Italy in Comparative Perspective

    DEFF Research Database (Denmark)

    Leschke, Janine

    2013-01-01

    Review of F.. Berton, M Richiardi, S. Sacchi: The Political Economy of Work Security and Flexibility: Italy in Comparative Perspective. Policy Press: Bristol, 2012. 190 pp.......Review of F.. Berton, M Richiardi, S. Sacchi: The Political Economy of Work Security and Flexibility: Italy in Comparative Perspective. Policy Press: Bristol, 2012. 190 pp....

  5. 76 FR 67751 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND... Border Protection, DHS/CBP-009--Electronic System for Travel Authorization (ESTA) System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance...

  6. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  7. Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives

    OpenAIRE

    Aneta Poniszewska-Maranda

    2014-01-01

    The security aspects of cloud computing, especially the security of data, become more and more important. It is necessary to find and develop the new mechanisms to secure the cloud. The problem presented in the paper concerns the mechanisms for security of cloud computing with special attention paid to aspects of access control in clouds - the state of the art and the perspectives for the future.

  8. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  9. A Dual Perspective on Risks and Security Within Research Assistantships

    Directory of Open Access Journals (Sweden)

    Johannes Petrus Rossouw

    2013-01-01

    Full Text Available Although research assistantships are considered research learning venues in graduate education, there is a scarcity of literature that examines ethical elements attached to the employment of graduate student research assistants or the position of their research supervisors. This article explores the need to implement formal regulations specific to research assistantships in order to increase security and decrease risks for research assistants and research supervisors. Relationships between research assistants and research supervisors have some similarities with regular employment relationships; yet some distinct differences arise due to the educational and developmental nature of research assistantships. The article is written from a dual perspective reflecting the authors’ roles (a research supervisor and a research assistant, respectively and institutional locations (Faculties of Education in South Africa and Canada. The authors draw from existing literature, an analysis of institutional policies and practices at their universities, and their personal and professional experiences to illustrate risks that research assistants and their supervisors may face within research assistantships. They assess the extent to which existing and proposed policies and practices influence working conditions and safeguard experiences within graduate research assistantships. The findings reveal that research assistantships are a unique form of employment focused on educational and professional development that requires specific documentation of expected standards of practice. The authors argue that lack of clear regulations exposes both parties to unnecessary risks and offer recommendations for creating a “Standards of Good Practice” document that will be useful for individuals engaged in research assistantships.

  10. The Study and Perspective of Mobile Agent Security

    Institute of Scientific and Technical Information of China (English)

    MU Hong; WANG Ru-chuan; WANG Hai-yan

    2004-01-01

    Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. So many projects have focused on the security issues of mobile agent and many mechanisms have been proposed to solve the security problem. This paper discusses the security issues and the countermeasures. Then it points out some directions for the research of the mobile agent security.

  11. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  12. How Data Mining Threatens Student Privacy. Joint Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives Serial No. 113-76 and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives Serial No. 113-61, House of Representatives, One Hundred Thirteenth Congress, Second Session (June 25, 2014)

    Science.gov (United States)

    US House of Representatives, 2015

    2015-01-01

    This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…

  13. “We Are Not Being Heard”: Aboriginal Perspectives on Traditional Foods Access and Food Security

    Science.gov (United States)

    Elliott, Bethany; Jayatilaka, Deepthi; Brown, Contessa; Varley, Leslie; Corbett, Kitty K.

    2012-01-01

    Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike. PMID:23346118

  14. “We Are Not Being Heard”: Aboriginal Perspectives on Traditional Foods Access and Food Security

    Directory of Open Access Journals (Sweden)

    Bethany Elliott

    2012-01-01

    Full Text Available Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike.

  15. "We are not being heard": Aboriginal perspectives on traditional foods access and food security.

    Science.gov (United States)

    Elliott, Bethany; Jayatilaka, Deepthi; Brown, Contessa; Varley, Leslie; Corbett, Kitty K

    2012-01-01

    Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike.

  16. Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective

    OpenAIRE

    2012-01-01

    Various security measures are ineffective having been designed without adequate usability and economic considerations. The primary objective of this thesis is to add an economic and socio-behavioral perspective to the traditional computer science research in information security. The resulting research is interdisciplinary, and the papers combine different approaches, ranging from analytic modeling to empirical measurements and user studies. Contributing to the fields of usable security and s...

  17. Perspectives of Security Ensuring within the Framework of Barcelona Process

    Directory of Open Access Journals (Sweden)

    T N Kirabaev

    2009-06-01

    Full Text Available Barcelona process was aimed to become an important mechanism in the realization of ideas of peace, stability and security ensuring in the Mediterranean Sea region. Cooperation in the sphere of security ensuring means openness of the regional states, social and economic reforms, human rights protection. The article deals with the problem of security ensuring by nonmilitary means.

  18. Attachment security balances perspectives: Effects of security priming on highly optimistic and pessimistic explanatory styles

    Directory of Open Access Journals (Sweden)

    Yanhe Deng

    2016-08-01

    Full Text Available Highly optimistic explanatory style (HOES and highly pessimistic explanatory style (HPES are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming – activating supportive representations of attachment security – on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: The security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  19. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  20. Homeland Security and Homeland Defense: The Seam of Uncertainty Unstitched?

    Science.gov (United States)

    2012-03-22

    problem still exists with the over-classification of intelligence. The Interagency lacks an overarching policy on Sensitive but Unclassified ( SBU ...documents, which doubled since 2001, and procedures that deal with the designation of these documents.61 The SBU documents are of “particular importance... SBU designations and applied them on information that did not warrant classification.63 This misuse of classification denies state and local fusion

  1. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    Science.gov (United States)

    2008-12-01

    file), November 5, 1987, ProQuest Historical Newspapers (1851 - 2004), A1. 22 Roberto Suro , Special to The New York Times, “False Migrant Claims...and Border Security: The 9/11 Commission Staff Report on Terrorist Travel. March 14, 2005. Suro . Roberto. Special to The New York Times. “False

  2. 78 FR 15962 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP...

    Science.gov (United States)

    2013-03-13

    .... Social Security Numbers (as volunteered by sole proprietors as their tax identification number); Internal... of lading; audits--internal & external; proof of background checks; contractual obligations; via a... 44 U.S.C. 2904 and 2906. D. To an agency or organization for the purpose of performing audit...

  3. INTRODUCTION: DESERTIFICATION AND SECURITY - PERSPECTIVES FOR THE MEDITERRANEAN REGION

    Science.gov (United States)

    This book focuses on two basic concepts: security and desertification in the Mediterranean Region and their linkages. It emerged from a single meeting of the "Workshop on Desertification in the Mediterranean Region. A Security Issue" held in Valencia, Spain on 2-5 December 2003...

  4. Windows And Linux Operating Systems From A Security Perspective

    CERN Document Server

    Bassil, Youssef

    2012-01-01

    Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different computer hardware. Most of the commercial operating systems available today on the market have buggy code and they exhibit security flaws and vulnerabilities. In effect, building a trusted operating system that can mostly resist attacks and provide a secure computing environment to protect the important assets of a computer is the goal of every operating system manufacturer. This paper deeply investigates the various security features of the two most widespread and successful operating systems, Microsoft Windows and Linux. The different security features, designs, and components of the two systems are to be covered elaborately, pin-pointing the key similarities and differences between them. In due ...

  5. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    Science.gov (United States)

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  6. Securing water quality and quantity: Research and development perspective

    CSIR Research Space (South Africa)

    Pienaar, H

    2012-10-01

    Full Text Available and quantity: Research and development perspective 4th Biennial Conference Harrison Pienaar 10 October 2012 Presentation outline ? Introduction and background to water in South Africa ? Transboundary water resource aspects ? Water related challenges...

  7. Water Security Problem in North China: Research and Perspective

    Institute of Scientific and Technical Information of China (English)

    XIA Jun; LIU Meng-Yu; JIA Shao-Feng

    2005-01-01

    This paper addresses the emergence of water security problems in North China with the aim of highlighting key water resources management and water security issues for the long-term development of North China. Three key problems related to water resources and security issues in North China in the 21st century are addressed, namely 1) the water cycle under environmental change, 2) agricultural water saving, and 3) water security. Development of international research related to these issues is also reviewed. The research plan developed recently by the Chinese Academy of Sciences (CAS) is discussed and suggestions on research and development of water resources science in North China are presented.Thanks to focus on experimental catchments and dedicated research stations, a detailed knowledge of the water cycle on North China farmland has been compiled. A range of techniques that include isotope tracers has been used to acquire hydrologic data. Much research has been devoted to developing distributed hydrological models at different scales. In the well irrigation district, five different water saving irrigation regimes have been investigated, and these regimes have had widespread application, and reduced water use 60-150 mm while they increased water use efficiency (WUE) by 20%-30%.Furthermore, preventing water pollution is the most essential step to ensure North China's water security.

  8. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  9. Smart Grid Security A Smart Meter-Centric Perspective

    DEFF Research Database (Denmark)

    Vigo, Roberto; Yuksel, Ender; Ramli, Carroline Dewi Puspa Kencana

    2012-01-01

    The electricity grid is a key infrastructure for our society, therefore its security is a critical public concern. This physical system is becoming more and more complex as it is coupled with a cyber layer carrying information about power usage and control instructions for intelligent appliances......, leading to what is known as the Smart Grid. The development of this Cyber-Physical System introduces new security issues, thus calling for efforts in studying possible attacks and devising suitable countermeasures. In this paper, we review a generic model for the Smart Grid, and present possible attacks...... and countermeasures focusing on a key component of the Smart Grid: the Smart Meter....

  10. Security Vulnerabilities in Web Application - An Attack Perspective.

    Directory of Open Access Journals (Sweden)

    S.Mirdula

    2013-04-01

    Full Text Available Security is the essential and important topic in web applications. The choice of communication made the web technology a essential one in the environment. The importance of web application and its securityincreasing day by day, but traditional networks fails to provide security for web application. This paper discuss about some of the vulnerable online attacks commonly occurs in web applications and providing solution for preventing such attacks by using penetration tool BACKTRACK. The testing aspect of vulnerabilities is carried out for SQL injection. The various methodologies are also discussed.

  11. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  12. Energy supply security and geopolitics : A European perspective

    NARCIS (Netherlands)

    Correlje, A; van der Linde, C

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets, Regions and Empires involves a world broken up in rival political and

  13. 31 The Gender Perspective of Household Food Security in Meskan ...

    African Journals Online (AJOL)

    Nekky Umera

    Despite the considerable number of rural women in Ethiopia and their ... A number of factors cause the difference in food security status between ... end the food insecurity problem of female-headed households as these ..... various cultural and traditional practices that are related to marriage. ... to a man at her young age.

  14. Energy supply security and geopolitics : A European perspective

    NARCIS (Netherlands)

    Correlje, A; van der Linde, C

    2006-01-01

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets, Regions and Empires involves a world broken up in rival political and eco

  15. Issues for Engagement: Asian Perspectives on Transnational Security Challenges

    Science.gov (United States)

    2010-01-01

    challenges are more than an academic diversion from traditional national security concerns. Indeed, the afghan government’s ability to effectively address...different order, there is evidence that some arms flows originate from central asia as well. an academic quantitative study conducted by michael Bhatia and...organized and equipped maritime arm of the liberation tamil tigers of eelam (ltte) presents al-Qaeda with a source to plagiarize for maritime

  16. Three Perspectives on DSEEP and Security : Training Goals, Use Cases and the Selection of Security Measures

    NARCIS (Netherlands)

    Möller, B.; Croom-Johnson, S.; Huiskamp, W.

    2013-01-01

    As joint, combined and Civil-Military exercises are becoming increasingly common, the need for security in collective mission simulation is growing. SISO has developed the Distributed Simulation Engineering and Execution Process (DSEEP) standard that provides a recommended process for development, i

  17. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  18. Crops and food security--experiences and perspectives from Taiwan.

    Science.gov (United States)

    Huang, Chen-Te; Fu, Tzu-Yu Richard; Chang, Su-San

    2009-01-01

    Food security is an important issue that is of concern for all countries around the world. There are many factors which may cause food insecurity including increasing demand, shortage of supply, trade condition, another countries' food policy, lack of money, high food and oil prices, decelerating productivity, speculation, etc. The food self-sufficiency ratio of Taiwan is only 30.6% weighted by energy in 2007. Total agriculture imports and cereals have increased significantly due to the expansion of livestock and fishery industries and improve living standard. The agriculture sector of Taiwan is facing many challenges, such as: low level of food self-sufficiency, aging farmers, large acreage of set-aside farmlands, small scale farming, soaring price of fertilizers, natural disasters accelerated by climate change, and rapid changes in the world food economy. To cope with these challenges, the present agricultural policy is based on three guidelines: "Healthfulness, Efficiency, and Sustainability." A program entitled "Turning Small Landlords into Large Tenants" was launched to make effective use of idle lands. Facing globalization and the food crisis, Taiwan will secure stable food supply through revitalization of its set-aside farmlands and international markets, and provide technical assistance to developing countries, in particular for staple food crops.

  19. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  20. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  1. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  2. Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

    Directory of Open Access Journals (Sweden)

    Usman Shafique

    2017-01-01

    Full Text Available A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.

  3. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.

    Science.gov (United States)

    Jennett, P; Watanabe, M; Igras, E; Premkumar, K; Hall, W

    1996-01-01

    The health care system is undergoing major reform, characterized by organized delivery systems (regionalization, decentralization, devolution, etc); shifts in care delivery sites; changing health provider roles; increasing consumer responsibilities; and accountability. Rapid advances in information technology and telecommunications have led to a new type of information infrastructure which can play a major role in this reform. Compatible health information systems are now being integrated and connected across institutional, regional, and sectorial boundaries. In the near future, these information systems will readily be accessed and shared by health providers, researchers, policy makers, health consumers, and the public. SECURITY is a critical characteristic of any health information system. This paper will address three fields associated with SECURITY: confidentiality, integrity, and availability. These will be defined and examined as they relate to specific aspects of Telemedicine, such as electronic integrated records and clinical databases; electronic transfer of documents; as well as data storage and disposal. The guiding principles, standards, and safeguards being considered and put in place to ensure that telemedicine information intrastructures can protect and benefit all stakeholders' rights and needs in both primary and secondary uses of information will be reviewed. Implemented, proposed, and tested institutional, System, and Network solutions will be discussed; for example, encryption-decryption methods; data transfer standards; individual and terminal access and entry I.D. and password levels; smart card access and PIN number control; data loss prevention strategies; interference alerts; information access keys; algorithm safeguards; and active marketing to users of standards and principles. Issues such as policy, implementation, and ownership will be addressed.

  4. DEVELOPMENT PERSPECTIVES OF SECURITIES SECONDARY MARKET IN REPUBLIC OF MOLDOVA

    Directory of Open Access Journals (Sweden)

    Chetraru Aliona

    2012-07-01

    Full Text Available It’s an urgent necessity to determine the specific problems of the securities market in Republic of Moldova, in the context of policies and strategies of accession to the European and International activity standards, performance and quality, along with the implication and effects of the international financial crisis. Identification of the influence factors with negative on the secondary market will enable the formulation of recommendations, proposals, improvement and refreshing techniques for the capital market as a whole. The analysis of the secondary market indicators allowed concluding on a high degree of uncertainty and predictability of its evolution. Legislative and regulatory issues on the securities secondary market activity of professional participants, admit the interpretation duality of provisions concerned. National Commission of Financial Market activity as a mega-regulator of the financial market, although involving a increased complexity of activities concerning supervision, control and regulation of the financial (non-banking sector, do not enjoy great efficiency in terms of stabilization and promotion of the financial sector. The appearance of a stock institution as an alternative to the existing one, after 20 years of experience of the latter, theoretically opens new market opportunities, although in practical terms, at this moment of time, the market participants are reserved and undecided on the future development trend of the secondary market. The study is based on statistical data contained in annual reports of the National Financial Market Commission and published on the official website of JSC „Stock Exchange of Moldova”, analysis of legislative and regulatory provisions and international practices. The statistics cover the whole period of operation of the secondary market in Republic of Moldova, that is from 1995 to 2012, as much as the stock market segment and the counter. The research methodology

  5. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    fascination with understanding how memes are passed on within cultures and become accepted as “common wisdom.” For the purpose of this thesis, the...terms their meaning. According to folk psychology, terms, such as “complacency,” develop and evolve within cultures, are passed on as memes , and...mind that ordinary people are inclined to endorse. It is the theory that mental state terms develop and evolve within cultures, are passed on as memes

  6. Intelligence Sharing, Fusion Centers, and Homeland Security

    Science.gov (United States)

    2008-06-01

    accurate and timely dissemination of crucial information. LCDR Christopher C. Thornlow in his Master’s Thesis , Fusing Intelligence with Law...networks. FCW, from http://www.fcw.com/print/13_16/news/102730-1.html Waterman, S (2008). Analysis: Einstein and U.S. Cybersecurity . UPI, from http...undergraduate studies at the University of Tennessee in Martin, Tennessee where he graduated with a Bachelor of Science degree in Criminal Justice

  7. European Approaches to Homeland Security and Counterterrorism

    Science.gov (United States)

    2006-07-24

    actual terrorist incident, a Cabinet-level emergency crisis management body — known as COBR (for the Cabinet Office briefing room in which it meets...is convened to coordinate the government’s immediate emergency response; COBR brings together the Prime Minister and other Cabinet ministers and... COBR , and the armed forces would have no jurisdiction outside of supporting the civil powers. The Ministry of Defense and the armed forces are also

  8. ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS

    Science.gov (United States)

    EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...

  9. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Force (also referred to as humanistic psychology) was a body of knowledge and theories separate from the behaviorist and Freudian movements...Eduardo Salas and Carolyn Prince, Team Performance Assessment and Measurement: Theory , Methods, and Applications (Mahwah, NJ: Lawrence Erlbaum Associates...Team Theory in a Unified Command Environment at Catastrophic Incidents” (Naval Postgraduate School, Monterey, CA, 2005). 18 Andrea Saveri, Howard

  10. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    1947 by George Kennan that argued for a policy of containment of the Soviet Union. The strong emphasis on values in the Narrative underscores the...Service, Excellence  Kent , WA Fire Department: Be Safe, Do Your Best, Serve With Integrity, Take Care of Each Other  Hazardville, CT Fire

  11. A Balanced Approach to Funding Homeland Security

    Science.gov (United States)

    2014-12-01

    Behavior ........................................68 2. Myth 2: Attitude Changes Behavior ..........................................69 3. Myth 3: People...verses another. Because DHS is assessing risk as a means to allocating resources to buy down risk, it is imperative, according to DHS, that its risk...economically healthy impulse .201 Crowdfunding is more than just money; it is facilitation, dedication, team building, and valuation. These are the

  12. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    this vessel was $490 million USD at the time of the incident and the parent company, Carnival Corporation, has insurance coverage in the amount of $510...million USD for the vessel with a deductable of approximately $30 million USD (Reuters UK Edition, 2012). The Carnival Corporation self-insures for...declined in the days and weeks after the incident (Reuters U.S. Edition, 2012). After this incident occurred, the stock price for Carnival

  13. Homeland Security Department: FY2007 Appropriations

    Science.gov (United States)

    2006-07-05

    Explosive Detection Systems; ETD: Explosive Trace Detection equipment; IT: Information Technology; FFDO: Federal Flight Deck Officer program; TWIC...willing to place back under warranty should be refurbished. The committee, however, emphasized that it does not believe that explosive trace detection (ETD

  14. 76 FR 34088 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-06-10

    ... participate in this HSAC teleconference via afore mentioned procedures. Each individual must provide his or... during the teleconference, contact Erika Nixon at the afore mentioned number (202) 447-3135. Dated:...

  15. An Interagency Command for Homeland Security

    Science.gov (United States)

    2002-04-01

    rule for many citizens during the initial hours of a large-scale CRBN [chemical, radiological, biological, or nuclear] incident” yet the “lack of an...official source of information on CRBN incidents has left the average citizen much less prepared, both intellectually and emotionally, than the

  16. Homeland Security Intelligence: To What End

    Science.gov (United States)

    2010-09-01

    author’s adaptive threat orientation model are derived spring from military strategist John Boyd’s (1995) “Observe-Orient-Decide-Act Loop” or “OODA...In his revolutionary presentation Organic Design for Command and Control (1995), military strategist John Boyd proposed the key to decisive combat...scholar Henry P. Monaghan (1970, p. 25) has proposed that contemporary Presidents have embraced the role of “Protector-in-Chief” and with “ever

  17. 2009 Homeland Security Symposium and Exhibition

    Science.gov (United States)

    2009-09-10

    benchmark in 2007. Page 46 http://charlestonharbourresort.com – Legitimate javascript applet used to detect flash player and has been injected with...transactions. • They install backdoors that " beacon " periodically to their command and control servers, allowing surreptitious access to the

  18. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    Philip Zimbardo (New York: Oxford Press, 2007), 241. 58 Ibid., 228. 26 The attacks on 9/11 killed 3,063 people. Although there were multiple... Zimbardo purports that we are not born with tendencies towards good or evil but with mental templates to do either.76 Arie Kruglanski and Shire Fishman...they able to commit such heinous acts? Zimbardo claims that few people will engage in an “end game” final solution without first being prepared

  19. Homeland Security Behind the Redwood Curtain

    Science.gov (United States)

    2007-09-01

    drink, then put it firmly down on the porch railing and turned toward me. “You wouldn’t believe how they talk to their mama ,” he said angrily. “They...a little boy who has cancer . Keep in touch!” she said with a friendly wave good-bye. Rugged is an appropriate adjective to describe this county

  20. Homeland Security Department: FY2008 Appropriations

    Science.gov (United States)

    2007-07-17

    for carry-on bags; whole body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The...transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS), which will be transferred from...transfer of the Biosurveillance program/project activity (PPA) to the new Office of Health Affairs. In addition, funding for the new Office of Emergency

  1. The State of Homeland Security 2007

    Science.gov (United States)

    2007-01-01

    divisions. • The State of Biosecurity. The Department’s grade in this area is a B-. A robust biointelligence and biosurveillance capability must...critical DNDO methods to conduct Advanced Spectroscopic Portal Monitors (ASP) cost-benefit analysis. The Department must improve upon the...methodologies applied toward radiation portal monitors. The Department should also examine the possibilities and implications of aggressive deployment of

  2. Homeland Security Department: FY2010 Appropriations

    Science.gov (United States)

    2009-12-14

    technology. While the TSA has abandoned the acquisition and operational utilization of trace detection portal (puffer) machines in favor WBI devices... Biosurveillance Integration System (NBIS), and the department’s occupational health and safety programs.160 Dr. Alexander G. Garza, President Obama’s...and $98 million is for biosurveillance , BioWatch, medical readiness planning, chemical response, and other activities

  3. 2006 Homeland Security Symposium and Exposition

    Science.gov (United States)

    2006-03-31

    Geoeconomic Studies • Paul A. Volker Chair in International Economics, Council on Foreign Relations; most recently Director, Congressional Budget...its recommendations •Re-engineer ESF-8 capabilities and responsibilities in partnership with DHS and other strategic partners • Brand the HHS Mission in

  4. Data Mining and Homeland Security: An Overview

    Science.gov (United States)

    2008-08-27

    Senator Patrick Leahy, “Letter of Attorney General Alberto Gonzales to the Chairman and Ranking Member of the Senate Judiciary Committee ordered...documents/nsa_myth_v_ reality.pdf]. 107 The Honorable Alberto Gonzalez, Testimony before the Senate Committee on the Judiciary, Wartime Executive Power

  5. PERSPECTIVE: Climate change, biofuels, and global food security

    Science.gov (United States)

    Cassman, Kenneth G.

    2007-03-01

    There is a new urgency to improve the accuracy of predicting climate change impact on crop yields because the balance between food supply and demand is shifting abruptly from surplus to deficit. This reversal is being driven by a rapid rise in petroleum prices and, in response, a massive global expansion of biofuel production from maize, oilseed, and sugar crops. Soon the price of these commodities will be determined by their value as feedstock for biofuel rather than their importance as human food or livestock feed [1]. The expectation that petroleum prices will remain high and supportive government policies in several major crop producing countries are providing strong momentum for continued expansion of biofuel production capacity and the associated pressures on global food supply. Farmers in countries that account for a majority of the world's biofuel crop production will enjoy the promise of markedly higher commodity prices and incomesNote1. In contrast, urban and rural poor in food-importing countries will pay much higher prices for basic food staples and there will be less grain available for humanitarian aid. For example, the developing countries of Africa import about 10 MMt of maize each year; another 3 5 MMt of cereal grains are provided as humanitarian aid (figure 1). In a world where more than 800 million are already undernourished and the demand for crop commodities may soon exceed supply, alleviating hunger will no longer be solely a matter of poverty alleviation and more equitable food distribution, which has been the situation for the past thirty years. Instead, food security will also depend on accelerating the rate of gain in crop yields and food production capacity at both local and global scales. Maize imports and cereal donations as humanitarian aid to the developing countries of Africa Figure 1. Maize imports (yellow bar) and cereal donations as humanitarian aid to the developing countries of Africa, 2001 2003. MMT = million metric tons. Data

  6. Do privacy and security regulations need a status update? Perspectives from an intergenerational survey.

    Science.gov (United States)

    Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A

    2017-01-01

    The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.

  7. Critical Homeland Infrastructure Protection

    Science.gov (United States)

    2007-01-01

    CIP Mr. Dan Mathis DPO-MA The National Innovative Technology and Ms. Elizabeth NITMAC Mission Assurance Center D’Andrea Current and Developing Issues...Vulnerabilities and COL Jeff Brown JTF-CNO Countermeasures Telecommunications Security and NSTAC Mr. Karl Rauscher NSTAC Anti-Terrorism/Force Protection LTC(P

  8. 77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2012-05-04

    ... 4, 2012 Part III Department of Homeland Security Transportation Security Administration Aviation... Aviation Security Advisory Committee (ASAC) Meeting AGENCY: Transportation Security Administration, DHS... Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on May...

  9. Social Security Contribution to Productivity and Wages in Labour Organization Perspective

    Science.gov (United States)

    Supriadi, Y. N.

    2017-03-01

    This research is investigating the discrepancy fulfilment of the right to social security and decent wages to increase labour productivity in the perspective of labour organizations, in which the company provides social security, and wages have not been able to meet the needs of workers, on the other hand, the workers are always required to increase productivity. Therefore, this study aims to identify the social security and wages that affect labour productivity. So this research will provide input to the company to undertake effective measures and efficient for the company’s sustainability. This research was conducted using a survey method approach and quantitative data analysis techniques that are causal comparative sample of 223 respondents from 504 study population includes all labour organization’s District and municipal in Banten Province. The results showed the significant influence of social security and wages to increase labour productivity. Therefore, companies are required to act strategically in maintaining prohibitionists labour through re-design of the work environment, increase workers’ participation, intervention, and satisfy the needs of workers whose impact will be realized understanding between workers and companies in maintaining the company’s business.

  10. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... Transportation Worker Identification Credential or Hazardous Materials Endorsement programs. (3) A...

  11. Michal Meidan (ed.), Shaping China’s Energy Security: The Inside Perspective

    OpenAIRE

    Kellner, Thierry

    2011-01-01

    Michal Meidan (ed.), Shaping China’s Energy Security: The Inside Perspective, Paris, Asia Centre/Centre études Asie, 2007, 239 pp. Claude Mandil, former Executive Director of the International Energy Agency, said last year that the global system is facing a triple crisis: supply crisis, climate crisis, and economic crisis. Those who are part of this system will have to ensure increased energy output even as they are forced to make significant cuts in greenhouse gases in order to deal with cli...

  12. Transnationalism: Diaspora-Homeland Development

    Science.gov (United States)

    Patterson, Rubin

    2006-01-01

    Based on detected correlations between the strategic collaboration of U.S.-based diasporas and their respective ancestral homelands on the one hand and the socioeconomic and technological development of those homelands on the other, this paper, which provides a conceptual foundation of the correlation, attempts to ignite a new area of research on…

  13. A Perspective of petroleum, natural gas, and coal bed methane on the energy security of India

    Energy Technology Data Exchange (ETDEWEB)

    Ghose, M.K.; Paul, B. [Indian School of Mines University, Dhanbad (India)

    2008-07-01

    The global energy requirement has grown at a phenomenal rate and the consumption of primary energy sources has been a very high positive growth. This article focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy in the foreseeable future. It examines energy requirement perspectives for India and demands of petroleum, natural gas, and coal bed methane in the foreseeable future. It discusses the state of present day petroleum and petrochemical industries in the country and the latest advances in them to take over in the next few years. The regional pattern of consumption of primary energy sources shows that oil remains as the largest single source of primary energy in most parts of the world. However, gas dominates as the prime source in some parts of the world. Economic development and poverty alleviation depend on securing affordable energy sources and for the country's energy security; it is necessary to adopt the latest technological advances in petroleum and petrochemical industries by supportive government policies. But such energy is very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively. Environmental laws for the abatement of environmental degradation are discussed in this paper. The paper concludes that energy security leading to energy independence is certainly possible and can be achieved through a planned manner.

  14. Changing Homeland Security: What Should Homeland Security Leaders Be Talking About?

    Science.gov (United States)

    2006-07-01

    top of the nation’s policy agenda. The discussions will be based on a mix of research , experience, opinion, ideology, and bias. Participants in the... constructionism , middle-of-the-road moderation, and radical reconstructionism.14 BELLA VIT A, CH A NGI NG HOMELA ND SECU R ITY 6...nation by paying more attention to the social and economic conditions that give rise to and support “premeditated, politically motivated violence

  15. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    FIGURES Figure 1.  Atlanta Police Department Organizational Chart ............................................32  Figure 2.  Atlanta Police Overall...40  Figure 4.  Hall County Fire Department Organizational Chart ........................................46...55  Figure 7.  Dekalb County Police Department Organizational Chart ................................62

  16. Homeland Security as a Stock Market: Antifragility as a Strategy for Homeland Security

    Science.gov (United States)

    2013-12-01

    pile eventually collapses. What interested Bak, was how big 73 Benjamin Franklin, Memoirs of the Life and Writings of Benjamin Franklin, Google ebook ...Google ebook ed. Vol. I. London: A.J. Valphy, 1818. Frontline, Money, Power and Wall Street, directed by Michael Kirk, Season 30, episode 10

  17. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  18. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  19. State of the Art of Network Security Perspectives in Cloud Computing

    Science.gov (United States)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  20. The Existence Of Leading Islands Securing And The Border Areas Unitary State Of Indonesia An Analysis In Law Perspective

    Directory of Open Access Journals (Sweden)

    Nazali

    2015-08-01

    Full Text Available Abstract The research was carried with the aim to discover the existence of securing the foremost islands and state border region of the Republic of Indonesia reviewed from a legal perspective which is directly related to the existence of security and dispute resolution methods as well as the governance of the foremost islands and border region in Kalimantan which bordering Malaysia. This study was conducted in Nunukan district and the surrounding provinces of Kalimantan in this research method that used is normative legal analysis data with juridical and qualitative descriptive approach. The results showed that the security of foremost islands and border region of law perspective in accordance with the Law No. 34 of 2004 regarding the Indonesian National Army has not been implemented to the fullest to realize the security of foremost islands and border region as the frontline of the Republic of Indonesia. The existence of leading islands securing and the border region of the Republic of Indonesia still contain many weaknesses in terms of both governance and security.

  1. The Rules of Engagement: Perspectives on Secure Messaging From Experienced Ambulatory Patient Portal Users.

    Science.gov (United States)

    Sieck, Cynthia J; Hefner, Jennifer L; Schnierle, Jeanette; Florian, Hannah; Agarwal, Aradhna; Rundell, Kristen; McAlearney, Ann Scheck

    2017-07-04

    Patient portals have shown promise in engaging individuals in self-management of chronic conditions by allowing patients to input and track health information and exchange secure electronic messages with their providers. Past studies have identified patient barriers to portal use including usability issues, low health literacy, and concerns about loss of personal contact as well as provider concerns such as increased time spent responding to messages. However, to date, studies of both patient and provider perspectives on portal use have focused on the pre-implementation or initial implementation phases and do not consider how these issues may change as patients and providers gain greater experience with portals. Our study examined the following research question: Within primary care offices with high rates of patient-portal use, what do experienced physician and patient users of the ambulatory portal perceive as the benefits and challenges of portal use in general and secure messaging in particular? This qualitative study involved 42 interviews with experienced physician and patient users of an ambulatory patient portal, Epic's MyChart. Participants were recruited from the Department of Family Medicine at a large Academic Medical Center (AMC) and included providers and their patients, who had been diagnosed with at least one chronic condition. A total of 29 patients and 13 primary care physicians participated in the interviews. All interviews were conducted by telephone and followed a semistructured interview guide. Interviews were transcribed verbatim to permit rigorous qualitative analysis. Both inductive and deductive methods were used to code and analyze the data iteratively, paying particular attention to themes involving secure messaging. Experienced portal users discussed several emergent themes related to a need for greater clarity on when and how to use the secure messaging feature. Patient concerns included worry about imposing on their physician's time

  2. THE EVOLUTION AND FUTURE OF SOCIAL SECURITY IN AFRICA: AN ACTUARIAL PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fatima Badat

    2015-09-01

    Full Text Available Social Security in most African countries has evolved significantly in terms of perspectives, motives, governance as well as innovation of benefits and administration. African countries are slowly, one by one, beginning to reassess the role of social security in correcting several social ills. Empowerment programs and grants are increasingly being provided via social security to women and the youth. From the roots of social security, even very low income countries, some of which have recently experienced several years of civil war and extreme economic hardships, have begun to improve benefit structures and amounts, which include national medical benefits. The attention being provided to social security and how it fits into a nation’s plans to lift itself out of poverty is increasingly involving the actuarial profession from international organisations such as ILO and ISSA as well as consulting actuaries and academics. Assessing and ensuring sustainability of social security benefits requires actuarial valuations to take long-term consequences involving demographic changes into account in the face of providing the benefits in the short term; asset liability modelling to ensure adequate resources are held; ensuring that results are appropriately reported and communicated to key stakeholders; as well as developing long-term strategic plans and dynamic systems surrounding all of these issues. In this paper, the role of actuaries is brought to the centre of the increasingly changing face and evolving culture of social security in taking Africa closer to poverty alleviation. La Seguridad Social en la mayoría de los países africanos ha evolucionado significativamente en cuanto a perspectivas, motivos, gobernanza, así como en innovación en las prestaciones y la adminsitración. Los países africanos están comenzando a reevaluar el papel de la Seguridad Social en la eliminación de determinados problemas sociales. Los programas de acción y los

  3. South African Homelands as Frontiers

    DEFF Research Database (Denmark)

    This book explores what happened to the homelands – in many ways the ultimate apartheid disgrace – after the fall of apartheid. The nine chapters contribute to understanding the multiple configurations that currently exist in areas formerly declared "homelands" or "Bantustans". Using the concept...... of frontier zones, the homelands emerge as areas in which the future of the South African postcolony is being renegotiated, contested and remade with hyper-real intensity. This is so because the many fault lines left over from apartheid (its loose ends, so to speak) – between white and black; between...... in these settings that the postcolonial promise of liberation and freedom must face its test. As such, the book offers highly nuanced and richly detailed analyses that go to the heart of the diverse dilemmas of post-apartheid South Africa as a whole, but simultaneously also provides in condensed form an extended...

  4. The Haptic Lines of Homeland

    Science.gov (United States)

    Dawson, P.; Takatsuka, M.

    2013-02-01

    This paper discusses the conceptual underpinnings, working processes and the tools used for preparing the scene files of a holographic art work which offers a subjective view point on the idea of homeland. The art work, Homeland, an optically formed fringe digital hologram, which is contextualized by the holographic maps used in situational awareness, indicates its subjectivity by strongly referencing the human body, particularly the lines of the palm of the hand. ... because the body belongs to the order of things as the world is universal flesh. Maurice Merleau-Ponty

  5. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the security identification display... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA)....

  6. Geophysical Tools, Challenges and Perspectives Related to Natural Hazards, Climate Change and Food Security

    Science.gov (United States)

    Fucugauchi, J. U.

    2013-05-01

    In the coming decades a changing climate and natural hazards will likely increase the vulnerability of agricultural and other food production infrastructures, posing increasing treats to industrialized and developing economies. While food security concerns affect us globally, the huge differences among countries in stocks, population size, poverty levels, economy, technologic development, transportation, health care systems and basic infrastructure will pose a much larger burden on populations in the developing and less developed world. In these economies, increase in the magnitude, duration and frequency of droughts, floods, hurricanes, rising sea levels, heat waves, thunderstorms, freezing events and other phenomena will pose severe costs on the population. For this presentation, we concentrate on a geophysical perspective of the problems, tools available, challenges and short and long-term perspectives. In many instances, a range of natural hazards are considered as unforeseen catastrophes, which suddenly affect without warning, resulting in major losses. Although the forecasting capacity in the different situations arising from climate change and natural hazards is still limited, there are a range of tools available to assess scenarios and forecast models for developing and implementing better mitigation strategies and prevention programs. Earth observation systems, geophysical instrumental networks, satellite observatories, improved understanding of phenomena, expanded global and regional databases, geographic information systems, higher capacity for computer modeling, numerical simulations, etc provide a scientific-technical framework for developing strategies. Hazard prevention and mitigation programs will result in high costs globally, however major costs and challenges concentrate on the less developed economies already affected by poverty, famines, health problems, social inequalities, poor infrastructure, low life expectancy, high population growth

  7. Inner Security in Media from the perspective of social science and media studies

    Directory of Open Access Journals (Sweden)

    Oliver Bidlo

    2012-07-01

    Full Text Available Security and entertainment are moving closer together. The term Securitainment expresses in this context, the mediation of security through entertainment formats. This will open a new space for Internal Security, which includes its own actors and patterns of interpretation. This space is portrayed in the media and follows the logic of media for attention but is also part of the process of social control. The mass media are therefore an instance of the design of internal security, social control and an interpretation producer. Mass media become actors of the internal security. They provide a symbolic representation of security.

  8. Software Assurance in Acquisition: Mitigating Risks to the Enterprise. A Reference Guide for Security-Enhanced Software Acquisition and Outsourcing

    Science.gov (United States)

    2009-02-01

    infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control and data acquisition (SCADA) security...software assurance, critical infrastructure protection, homeland security, cyber crime and terrorism, cyber law, biomet - rics, supervisory control

  9. Securing the airway in a child with tracheal agenesis – an alternative perspective

    Directory of Open Access Journals (Sweden)

    Slavomir Nosal

    2011-03-01

    Full Text Available Tracheal agenesis is an extremely rare, typically fatal congenital anomaly characterised by typical clinical manifestation, failed endotracheal intubation and difficult emergency management. The prognosis and possibility of surgical correction rest on early diagnosis, anatomy, birth weight, and associated anomalies. Tracheal agenesis causes considerable resuscitation difficulties immediately after birth, as tracheal intubation is impossible. Although emergency management, by either bag and mask ventilation or oesophageal intubation, provides some pulmonary gas exchange through tracheo-oesophageal connection, they are associated with overdistension of the stomach and the risk of stomach perforation. We have performed selective intubation of the distal trachea in a child with tracheal agenesis through the tracheo-oesophageal connection with the help of a fibroendoscope. A standard guide wire was passed through the working port of the flexible endoscope and under direct vision was directed through the tracheo-oesophageal connection into the distal trachea. At this point, the endoscope was removed, leaving the guide wire in place. The endotracheal tube size 2 Fr was passed over the guide wire into the distal trachea. The infant showed dramatic improvement and maintained good saturations on mechanical ventilation. The infant was taken for a computed tomography (CT scan, which showed Floyd’s type II tracheal agenesis, the oesophagus connecting with the distal trachea before it bifurcates. The endotracheal tube was seen ending in the carina. Transoesophageal intubation of the short distal segment of the trachea through the tracheo-oesophageal connection might offer a new perspective for short-term securing of the airway in a child with tracheal agenesis and should be considered in any child with suspected tracheal agenesis to buy the time while evaluating the exact anatomy of the anomaly and the possibility of tracheal reconstruction in selected

  10. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  11. Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance

    CERN Document Server

    Mather, Tim; Latif, Shahed

    2009-01-01

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn deta

  12. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  13. Reviewing the status of agricultural production in Bangladesh from a food security perspective

    OpenAIRE

    Ghose Bishwajit; Razib Barmon; Sharmistha Ghosh

    2014-01-01

    This paper aims to review the major food security issues in Bangladesh, with a brief reference to its past trend in agricultural output, constraints, and challenges in the coming decades. Food security relates directly to nutrition and health of a population which consequently influences a nation's socio-economic status. Despite Bangladesh has changed its status from a country with chronic food shortages to a self-sufficient one, it still faces food-security challenges. Few non-agricultural f...

  14. An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users

    Directory of Open Access Journals (Sweden)

    Patryk Szewczyk

    2012-12-01

    Full Text Available It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for end-users. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.

  15. ORIGIN, DEVELOPMENT AND PERSPECTIVES FOR THE HUMAN SECURITY CONCEPT IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Karina Paulina Marczuk

    2007-07-01

    Full Text Available The wide economic support and an attempt to guarantee safety, which the European governments are trying to provide for their citizens, are reasons why the European Union explores new directions of conducting common policies for which the most important is the human being and his needs. The European security policy – and the new concept of human security – could be one example of the EU`s new behavior. Taking into consideration the previous attempts at developing security theories in Europe and other countries, it is possible to state that the modern human security doctrine in the EU could be followed by creating a special kind of European corps which would be a new tool for ensuring security where it would be necessary to provide it – European Gendarmerie Forces (known as EGF or EUROGENDFOR. The aim of this article is to show the impact of the evolution of the modern security theories for creating a human security doctrine in the framework of the European Union. Moreover, genesis and activity of the EGF are presented and the author is trying to answer the question: could the EGF be a tool of human security in the EU?. Finally, a couple of proposals for the future development of the European security policy are mentioned.

  16. Study on the Community Policing Administration Innovation from the Perspective of the Public Security Governance

    Institute of Scientific and Technical Information of China (English)

    Jian LIN

    2015-01-01

    Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.

  17. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developi

  18. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developi

  19. Human Security and the Governmentality of Neo-Liberal Mobility : A Feminist Perspective

    NARCIS (Netherlands)

    T-D. Truong (Thanh-Dam)

    2006-01-01

    textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and th

  20. The Interface of Safety and Security in Transport: A Regional Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Welch, Tim [ORNL; Duhamel, David A [ORNL; Nandakumar, A. N. [Mumbai, India; ParamiPhD, Vangeline K. [Philippine Nuclear Research Institute, Quezon City, Philippines; Bajwa, Christopher [International Atomic Energy Agency (IAEA); Shannon, Michael [International Atomic Energy Agency (IAEA)

    2016-01-01

    Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators, inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios

  1. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    Science.gov (United States)

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    2015-01-01

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  2. India's energy security: A sample of business, government, civil society, and university perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Bambawale, Malavika Jain, E-mail: sppmjb@nus.edu.s [Energy Governance Program, Centre on Asia and Globalisation, Lee Kuan Yew School of Public Policy, National University of Singapore, Oei Tiong Ham Building, 469C Bukit Timah Road, Singapore 259772 (Singapore); Sovacool, Benjamin K., E-mail: bsovacool@nus.edu.s [Energy Governance Program, Centre on Asia and Globalisation, Lee Kuan Yew School of Public Policy, National University of Singapore, Oei Tiong Ham Building, 469C Bukit Timah Road, Singapore 259772 (Singapore)

    2011-03-15

    This article explores the concept of energy security perceived and understood by a sample of government, business, civil society, and university stakeholders in India. Based on a literature review, the authors hypothesize what energy experts suggest energy security is for India. The article then tests these hypotheses through the use of a survey completed by 172 Indian respondents. The article begins by describing its methodology before summarizing the results of the literature review to distill seven working hypotheses related to energy security in India. These hypotheses relate to (1) security of energy supply, (2) equitable access to energy services, (3) research and development of new energy technologies, (4) energy efficiency and conservation, (5) self-sufficiency and trade in energy fuels, (6) nuclear power, and (7) the energy-water nexus. It then tests these hypotheses with our survey instrument before concluding with implications for energy policy in India and beyond. - Research highlights: {yields} We measured the concept of energy security for India through a survey that tested the importance of 16 dimensions. {yields} For our sample of respondents from India, as hypothesized, security of fossil fuel supply, R and D in new technologies, centralized energy systems, and the availability of clean water emerged as important dimensions. {yields} Equitable access to energy and low energy intensity did not emerge as important dimensions of energy security for our sample even though we hypothesized them to be so.

  3. Urban crime prevention and the logics of public security policies in Brazil – a relational perspective on the local fields of negotiation

    Directory of Open Access Journals (Sweden)

    Haubrich, Dominik

    2015-03-01

    Full Text Available Public security is a highly contested issue in urban societies. It involves, stresses or excludes a wide spectrum of actors, policies and spaces on different scales and time lapse. Meanwhile, public security possesses a central position in the recent transcontextual discussion of area-based urban security studies. Therein, both questions of social change and the spatial, political and economical reflection of (insecurity issues are increasingly concerning the current transforming logic of public security policies. To capture this transformation from a theoretical as well as empirical perspective, this papers looks at the local security governance field in the municipality of São Paulo. It argues that the political field of local crime prevention councils (CONSEG, hosted on the district level once a month, is suited to understand the conceptual shift of the crime control paradigm in general and its spatial translation into discourses, programs, instruments and measures of local security provision in particular.

  4. Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective

    Directory of Open Access Journals (Sweden)

    Craig Valli

    2009-09-01

    Full Text Available Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.

  5. Challenges in Managing Information Security From an Organization’s Perspective

    Directory of Open Access Journals (Sweden)

    Patrick Kanyolo Ngumbi

    2010-07-01

    Full Text Available This study used purposefully selected employees to fill self-administered unstructured questionnaires to provide information on aspects concerning information security at organizational level. The responses were subjected to non-probability analysis from which understanding of challenges encountered and subsequent impact were obtained. Six evaluation questions were used to gain insight into information security components. The study documented four categories of challenges encountered, possible outcomes of challenges and consequential impact. These results are beneficial to business end-users, information security managers, top and senior management in organizations.

  6. Privacy and data security in E-health: requirements from the user's perspective.

    Science.gov (United States)

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  7. Security Conditions and Regional Competition in East Asia after the New Millennium: A South Korean Perspective

    National Research Council Canada - National Science Library

    Chong Jin Oh

    2012-01-01

    ... economically, it has been struggling to contend with security issues such as the North Korean nuclear problem, revision of the South Korean-US alliance, Japanese militarisation, the rise of China, and so...

  8. Social Media Platforms as a Tool for Sharing Emotions. A Perspective upon the National Security Agencies

    National Research Council Canada - National Science Library

    Ramona-Diana Leon; Liana Maria Marcu

    2016-01-01

    ... on social media should be twofold: on the one hand, it should reflect the attitudes, values and beliefs, supported by the institution, and on the other hand, it should have an impact on citizens feeling of security...

  9. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  10. Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century

    Science.gov (United States)

    2006-10-21

    what items were needed for collection. No one, for example, foresaw the immense need for diapers and baby formula. The diverse set of actors and...and large, is not. It does not do me any good to begin with a slide that talks about 9/11. I have quit talking about the global war on terrorism...modern world could unwrap —costing us friends, markets , and national power. Eventually what we could see is the loss of the character of the modern

  11. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Interprofessional Learning Scale (RIPLS) or the 18-item Interprofessional Education Perception Scale ( IEPS ) to measure students’ attitudes and perceptions of...multi-disciplinary teamwork and collaboration, professional identity, and roles and responsibilities. RIPLS and/or IEPS data is gathered and analyzed...changes in knowledge, skills, and attitudes via RIPLS or IEPS data could quantitatively identify the benefits of the CHDS model to building

  12. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    OpenAIRE

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developing regions, but also the food system stability in general? To investigate this, an overview of international actors working in the field of wastage has been made, with a European/Dutch focus. Their...

  13. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  14. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities §...

  15. 49 CFR 1542.107 - Changed conditions affecting security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the...

  16. REVIEWING THE STATUS OF AGRICULTURAL PRODUCTION IN BANGLADESH FROM A FOOD SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This paper aims to review the major food security issues in Bangladesh, with a brief reference to its past trend in agricultural output, constraints, and challenges in the coming decades. Food security relates directly to nutrition and health of a population which consequently influences a nation's socio-economic status. Despite Bangladesh has changed its status from a country with chronic food shortages to a self-sufficient one, it still faces food-security challenges. Few non-agricultural factors are identified as equally responsible for aggravating the food insecurity scenario. Since its independence in 1971, the country has constantly been facing issues like high population growth, political unrest, natural disasters which are contributing to food insecurity. Though industrialization is the order of the modern economy, agriculture remains the lifeblood of food security, especially for predominantly agrarian economies like Bangladesh. And this truth must be emphasized and implemented accordingly so that the predicted food crisis in near future can be successfully avoided. This article aims to review the performance of different agricultural sectors and to identify major setbacks to achieving food security in Bangladesh. This study is based on previously published researches on various food security issues in the context of Bangladesh.

  17. Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

    Directory of Open Access Journals (Sweden)

    Tehseen Mehraj

    2015-08-01

    Full Text Available With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.

  18. 78 FR 28237 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-14

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory... Telecommunications Advisory Committee, National Protection and Programs Directorate, Department of Homeland...

  19. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  20. Social Media Platforms as a Tool for Sharing Emotions. A Perspective upon the National Security Agencies

    Directory of Open Access Journals (Sweden)

    Ramona-Diana LEON

    2016-05-01

    Full Text Available Emotions importance increases even more in the context of the national security agencies. Since their mission is to protect and defend the citizens against attacks and also to provide leadership and justice services to other agencies and partners, the aim of the information they post on social media should be twofold: on the one hand, it should reflect the attitudes, values and beliefs, supported by the institution, and on the other hand, it should have an impact on citizens feeling of security. But, do they manage to meet these demands? Are they focusing on impressing the audience or they concentrate on sharing specific emotions? Is it a marketing strategy or a knowledge strategy? Starting from these, the purpose of this research is to set a nexus between emotions and the use of social media by the national security organizations. In other words, we aim (i to determine the main types of emotions, (ii to establish whether these are shared within the social media platforms, (iii to identify the purpose for which the national security organizations use social media, (iv to determine whether social media could serve as Ba for the national security organizations. In order to achieve these objectives, we employ an ethic approach and develop a longitudinal study based on quantitative and qualitative content analysis. The results prove that social media platforms may serve as Ba since they appear as a shared space which fosters individual and collective knowledge creation and sharing. The national security agencies  use social media platforms for combining the classical four types of Ba: originating Ba (it shares its emotions, feelings and thoughts through its posts, interacting Ba (through the generated reactions and comments, it ensures the development of shared models and the conversion of tacit knowledge into explicit knowledge, cyber Ba (by fostering the virtual interaction among its followers and exercising Ba (by facilitating the creation of

  1. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  2. Food Security - Global Trends and Region Perspective with Reference to East Asia

    OpenAIRE

    Chang, Ching-Cheng; Hsu, Shih-Hsun

    2011-01-01

    The sharp increase in global food prices during 2007‐2008 has triggered the awareness of food insecurity problems and their impacts on the low income, food‐deficit countries many of which are located in the East Asian countries. The food‐security situation was good in relative terms given that the percentage of carbohydrates consumed is slightly lower than the world average while proteins and fats consumption are higher than that of other regions. The food security in East Asia is largely dri...

  3. Cloud Storage Vendors Wide Support and Security Key Features for Shifting Towards Business Perspective

    Directory of Open Access Journals (Sweden)

    T Prasath

    2014-02-01

    Full Text Available The emerging trends that suits well with the shifting terminologies of computational environment. The cloud computing plays the vital role in today’s business activities. The essential fact of computing rapid technological shift towards cloud.  The storage medium of cloud provides common public spacing, privatized infrastructure, and other platform supports are facilitated. Here in this paper a brief scrutiny  under gone on various cloud storage vendors. The various cloud storage vendors provides data storage, space availability, scaling, sharing, secure transmission between cloud storage medium. Here different vendors wide data storage mediums are discussed with their security features and data access managing capabilities are rendered.

  4. WiMAX security and quality of service an end-to-end perspective

    CERN Document Server

    Tang, Seok-Yee; Sharif, Hamid

    2010-01-01

    WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements.

  5. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  6. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  7. A systems science perspective and transdisciplinary models for food and nutrition security

    Science.gov (United States)

    Hammond, Ross A.; Dubé, Laurette

    2012-01-01

    We argue that food and nutrition security is driven by complex underlying systems and that both research and policy in this area would benefit from a systems approach. We present a framework for such an approach, examine key underlying systems, and identify transdisciplinary modeling tools that may prove especially useful. PMID:22826247

  8. Internet of things: emerging and future scenarios from an information security perspective

    CSIR Research Space (South Africa)

    Dlamini, MT

    2009-08-01

    Full Text Available Information security is becoming a major concern for most worldwide telecommunication companies and more so as we move towards the future Internet of Things. In this era, a plethora of digital devices, people and other physical objects have...

  9. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  10. Secure Data Exchange in P2P Data Sharing Systems in eHealth Perspective

    Directory of Open Access Journals (Sweden)

    Mehedi Masud

    2012-11-01

    Full Text Available In P2P data sharing systems (P2PDSS peers share data in a pair-wise fashion. Data are shared on-the-fly by establishing temporary data exchange session for user queries. Generally, the communication link between peers is unsecured while exchanging data. In P2P eHealth data sharing scenarios, peers may need to exchange highly confidential data among them. Hence, there are some security threats that need to be considered (e.g. data might be trapped and disclosed by the intruders. In a P2PDSS, we cannot assume any third party security infrastructure (e.g. PKI to protect confidential data. Considering the need of secure data exchange in P2PDSS, in this paper we propose a secure data exchange model. The model is based on pairing-based cryptography and the data sharing policy between peers. Applying the model, peers compute secret session keys dynamically by computing pairing on elliptic curve, based on the data sharing policies while exchanging data. The proposed protocol is robust against the man-in-the middle attack, the masquerade attack and the replay attack.

  11. Deciding Who Lives: Considered Risk Casualty Decisions in Homeland Security

    Science.gov (United States)

    2008-12-01

    into a burning inferno . Where to draw the line between role-related professional responsibilities and undue risk is a question [we] ... did not...doing so in infernos and, therefore, failed to realize that the time for further rescue efforts had passed. This dichotomy of experience created at

  12. Department of Homeland Security: Assessments of Selected Complex Acquisitions

    Science.gov (United States)

    2010-06-01

    known as Tucson-1 and Ajo -1. The program plans to complete testing before DHS approves deployment at additional Block 1 sites. Tucson-1, the...acceptance of the initial Block 1 systems at the Tucson-1 and Ajo -1 sites by March 2011. The Block 1 program baseline currently requires the

  13. Strengthening Homeland Security through Improved Foreign Language Capability

    Science.gov (United States)

    2011-12-01

    sports, medicine, or poetry , for example. DTRA interpreters are sometimes assigned to support a ―civilian Executive Interpreter.‖ Defense Threat...about two pounds.‖ In addition, RACSPC students participate in memory -enhancing drills and games.172 In addition to completing RACSPC, linguists...original order from memory . Once the reversal is complete, students then translate the words, and again proceed in both orders. According to the

  14. 75 FR 55529 - Homeland Security Acquisition Regulation (HSAR); Revision Initiative

    Science.gov (United States)

    2010-09-13

    ... HSAR 3002.101 and usage conventions. Add a new HSAR subpart 3003.10, Contractor Code of Business Ethics... follows: Subpart 3003.10--Contractor Code of Business Ethics and Conduct Sec. 3003.1003 Requirements. 3003.1004 Contract clauses. Subpart 3003.10--Contractor Code of Business Ethics and Conduct 3003.1003...

  15. Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Kimberly A. [Georgia Inst. of Technology, Atlanta, GA (United States)

    2008-01-01

    A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

  16. Has the Department of Homeland Security (DHS) Outlived Its Usefulness?

    Science.gov (United States)

    2012-12-01

    many sick, elderly , and bed-ridden people in hospitals and nursing homes who suffered a horrific fate as staff members chose not to evacuate patients...Plot,” International Centre For Political Violence and Terrorism Research, http://www.pvtr.org/pdf/GlobalAnalysis...due to either the lack of capability or the means to acquire it. This was the case at the St. Rita’s nursing home, where 40 of the 60 residents died

  17. Changing Homeland Security: The Year in Review - 2008

    Science.gov (United States)

    2009-01-01

    Pirates and their small boats have moved from Disney amusement to global menace. Thomas Jefferson wrote that a politician looks forward only to...firebombing attacks in Santa Cruz. Members of an animal rights group were the suspected perpetrators. This was a significant event for the area

  18. U.S. Biodefense & Homeland Security: Toward Detection & Attribution

    Science.gov (United States)

    2006-12-01

    None of these contained the bacteria. A common source eluded investigators even though every item was traced back to its origin. The lettuce and...possessed or worked with Ames. As a result, efforts were taken to identify the different genomes linked to its use in these laboratories.192 Dugway...of events and to facilitate coordinated response.”301 The goal is to “collect, assemble , and analyze a wide range of relevant information and make

  19. Securing Nuclear and Radiological Material in the Homeland

    Science.gov (United States)

    2007-03-01

    John Walker Lindh allegedly told interrogators that battlefield rumors suggested that a biological attack was expected to be a “second wave...al- Qa`ida attack. 10/3/2002 “American Taliban” John Walker Lindh , citing “battlefield rumors” “US biological attack imminent -- Taliban...iafrica.com, 12 December 2001; “Walker Lindh : Al Qaeda Planned More Attacks,” CNN, 3 October 2002 post-2001 Chemical/ Biological French Interior

  20. Quantitative Risk Analysis for Homeland Security Resource Allocation

    Science.gov (United States)

    2006-12-01

    156 A. Papoulis , Probability, Random Variables and Stochastic Processes, (New York: McGraw-Hill, 1965), chapters 5-7. 44 max ( ) D R D...Report. New York: W.W. Norton. Papoulis , A. 1965. Probability, Random Variables and Stochastic Processes. New York: McGraw-Hill. Pate-Cornell

  1. Nuclear and Solar Energy: Implications for Homeland Security

    Science.gov (United States)

    2008-12-01

    Hirschman Index HVDC High-Voltage Direct Current IPCC Intergovernmental Panel on Climate change NCEP National Commission on Energy Policy NRC...transmission lines will carry the load to the customers along high voltage direct current ( HVDC ) lines. HVDC lines lose 3% of

  2. Southwest Hispanic Community -- The Absence of Homeland Security Threats

    Science.gov (United States)

    2012-12-01

    150 U.S. Navy, “9 - Foreign Language,” Navy Equal Opportunity (EO) Policy, OPNAVINST 5354.1F, 2007. 151 “Yo No Hablo Espanol : BUT I AM STILL LATINO...DAMN IT!!!!” Yahoo! Contributor Network, accessed September 27, 2012, http://voices.yahoo.com/yo-no-hablo- espanol -but-am-still-latino-damn-it- 73855

  3. Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support

    Science.gov (United States)

    2011-12-01

    AIRSPACE Some have likened the airspace above the U.S. to a soap opera plot due to its complexity and elaborate structure.59 However, understanding its...applicable to define an ELOS for UAS.” 23 Fourth, there is a public education aspect to UAS integration that analysts claim requires attention. The

  4. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    Science.gov (United States)

    2007-11-02

    Number Author(s) Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) General Accouting Office, PO Box 37050...budget. As GAO’s long term budget simulation notes, known demographic trends and rising health care costs will place unprecedented pressures on our...non-partisan, and non-ideological audits, investigations and evaluations. We currently have over 60 congressional requests to conduct reviews in

  5. Leveraging Social Media to Engage the Public in Homeland Security

    Science.gov (United States)

    2009-09-01

    date information. “Our team knew where we could buy gas, we knew what roads were open and most importantly, we knew who needed help and where they were...more complete warning messages and how the public utilizes social media as an emergency moves into an extended length of time—do their habits ...so that they can define their needs.  You need to get to “Robust Statement of Needs” 84 Enablers  New Generation (The Millennials ) are

  6. 78 FR 14102 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-03-04

    ...). The HSAAC provides advice and recommendations to the Secretary and senior leadership on matters... Management Institute and the higher education community to support Presidential Policy Directive 8...

  7. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    organizations. Similar to the previous discussion of conflict biguity in public policy implementation, these factors are the degree of agreement ree of...4. Networking and Collaboration Laurence O’Toole has written of the growing need for and the emergence of networks and collaboration in public...there is no unifying theory about networking in the public sector, Nancy Roberts c 242 Laurence O’Toole, Jr., “Treating Networks Seriously: Practical

  8. 7 CFR 2.32 - Director, Office of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ..., disseminate and store USDA intelligence requirements and convey information to the intelligence community. (3...). (8) Administer a competitive grant program to support the development and expansion of advanced... veterinarians; administer a competitive grant and low-interest loan assistance program to assist States...

  9. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  10. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    elevated insulin levels are a telltale sign of insulin resistance. Insulin resistance creates significant fat accumulation around the abdomen . This...THE POLICIES AND POLITICS OF OBESITY: WHO MADE U.S. FAT ? .....45  A.  FRITZ HABER AND THE HABER BOSCH PROCESS .........................46  B...Compared to Percent Calories from Fat Among U.S. Adults. Screen shot provided by a Dr. Robert Lustig lecture ..................83  Figure 11.  Loss and

  11. War in the Atlantic: A Historical Case of Homeland Security

    Science.gov (United States)

    2015-09-01

    costs . The staggering toll of the “unrestricted” campaign, amplified by rising numbers of neutral vessels that ceased to operate, given the risk, far...outweighed the expense of convoys. As shipping attrition began to foreclose Britain’s ability to fight the war, the costs of the convoy system became...sighting to attack.33 Initially, convoys were arranged for ships inbound to Great Britain only, as the most pressing need was for supplies from abroad

  12. Congressional Oversight of Homeland Security: Help or Hinderance?

    Science.gov (United States)

    2012-12-01

    gather the information required to conduct effective oversight many intelligence abuses ensued. The 1972 Watergate scandal was the event that...Political Science 28, no. 1 (1984): 166. 6 scandals or failures for its 65-year history. Although there have been instances where fire alarm...their findings. The Iran-Contra scandal occurred less than ten years later. Furthermore, the intelligence community’s slow adaptation to the post

  13. Department of Homeland Security Cyber Resilience Review (Case Study)

    Science.gov (United States)

    2014-01-23

    results CERT® Operational Resilience: Manage, Protect, and Sustain Twitter #CERTopRES © 2013 Carnegie Mellon University CRR Benefits Participating...Management CTRL Controls Management VM Vulnerability Management IM Incident Management SCM Service Continuity Management EXD External...established in Asset Management benefits the organization as it manages changes. CERT® Operational Resilience: Manage, Protect, and Sustain

  14. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  15. Expanding the Role of Emergency Medical Services in Homeland Security

    Science.gov (United States)

    2013-03-01

    Medical Services FEMA Federal Emergency Management Agency FBI Federal Bureau of Investigation H1N1 Influenza a Virus HIPAA Health Information...Smyth, William G. Manley, Daniel E. Summers, Nels D. Sanddal, Teri L. Sanddal, et al. “Realities of Rural Emergency Medical Services Disaster

  16. Will Climate Change the Future of Homeland Security

    Science.gov (United States)

    2016-09-01

    Brookings-Bern Project on Internal Displacement, 2013), 9–18, http://www.brookings.edu/~/media/ research /files/ papers /2013/1/30-arctic-alaska-bronen...nuclear sources, and renewable energy resources (hydro, wind, biomass, geothermal , and solar power) are also used in the generation of... Research Program, 2014), 119, http://nca2014.globalchange.gov/ report/sectors/ energy . 57 According to Climate Change Impacts in the United States

  17. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    hard way and his lack of crisis communication skills was a career ender for him during Hurricane Katrina (MSNBC, 2005). In contrast, former New...disruptions,” that is those game -changing events where your messages may no longer work. That leads into the final recommendation of having a contingency...Winning in the no-spin era by someone who knows the game . New York: Free Press. CNN. (2007, May 7). Greensburg focuses on rebuilding. Retrieved January

  18. Public Health Specializations and Education Needs to Support Homeland Security

    Science.gov (United States)

    2006-03-01

    Hazmat 1/1 100 4 Health Consultant Interface with Law Enforcement 1/1 100 4 Hematology 1/1 100 4 Hospital Administrators 3/7 43 30 Hospital Safety...Forensics Experts 0/1 0 4 Grants Oversight 0/2 0 9 Hazmat 1/1 100 4 Health Consultant Interface with Law Enforcement 0/1 0 4 Hematology 0/1 0 4...Specializations Required Workforce Gaps (yes/no) Other Comments Veterinarians Yes Epidemiologists Yes Physicians No Plenty of physicians available but

  19. The National Guard: A Future Homeland Security Paradigm?

    Science.gov (United States)

    2007-11-02

    Arabia (1995); bombing of a U.S. military complex “Khobar Towers” in Saudi Arabia (1996); U.S. Embassy bombings in Nairobi, Kenya and Dar Ex Salaam...on the U.S, its forces, and allies. The Triad continues to be the foundation of America’s national strategy of deterrence. The Triad consists of...ballistic missile submarines, land- based intercontinental ballistic missiles and long-range bombers. Each component, or leg, of the Triad provides a

  20. Homeland Security Organizations: Design Contingencies in Complex Environments

    Science.gov (United States)

    2011-09-01

    in Charge Cell OMT Organization and Management Theory OPERATIONS Section Los Angeles County Operational Area Unified Command- Operations Section...and management theory” ( OMT ). The OMT literature suggests that no single organizational design is optimal in all situations, nor do all designs...referred to as Organization and Management Theory ( OMT )—have been extensively examined in the literature, using at various times and by different

  1. Homeland Security: Federal Assistance Funding and Business Opportunities

    Science.gov (United States)

    2003-08-14

    for many states under the State Single Point of Contact ( SPOCs ) section available at [http://www.whitehouse.gov/omb/grants/spoc.html]. A similar...government, employees and students at U.S. educational institutions, and other eligible members of the general public. Background information on the RaDiUS

  2. Japan as a Paradigm for U.S. Homeland Security

    Science.gov (United States)

    2006-12-01

    the dead cause the everyday problems of the living and emphasizes liberation from stress through meditation .118 In 1984, he and his wife started...www.jijigaho.or.jp/ app /0404/eng/iraq01.html (accessed December 6, 2005). 196 Prime Minister of Japan and His Cabinet, Japan’s Assistance for the...Defense Forces to assist in Reconstruction.” http://www.jijigaho.or.jp/ app /0404/eng/iraq01.html (accessed December 6, 2005). Kaplan, David E. and

  3. 77 FR 61421 - Committee Name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2012-10-09

    ..., student veterans, and recent graduates to jobs at DHS; how to use social media and other means of..., and other Minority Serving Institutions know of and take advantage of DHS internship and job...

  4. Developing the Bench: Building An Effective Homeland Security Undergraduate Program

    Science.gov (United States)

    2008-03-01

    University Savannah State University Jacksonville State University AMERICAN PUBLIC UNIVERSITY University of Maryland University College...DATA University Courses American Public University - Charles Town, WV Emergency Planning Emergency Response to Terrorism Chemical...0195095707 AMERICAN PUBLIC UNIVERSITY 0195142632 University of Central Missouri 0195158342 Empire State College 0195332474 Virginia Commonwealth

  5. The Strategic Value of Humanitarian Immigration Policy Toward Homeland Security

    Science.gov (United States)

    2008-03-01

    E. Beutler, James N. Breckenridge, and Philip Zimbardo (New York, NY: Oxford University Press, 2007), 14-15. 6 Ibid., 16-17. 11 that is worth...ed. Bruce Bongar, Lisa M. Brown, Larry E. Beutler, James N. Breckenridge, and Philip Zimbardo . New York, NY: Oxford University Press, 2007...the United States. In his recent book Winning the Right War, Philip Gordon writes: It is difficult today to imagine a world without the Islamist

  6. Homeland Security Department: FY2008 Request for Appropriations

    Science.gov (United States)

    2007-05-17

    body imaging; explosive trace detection portal machines; cast and prosthetic device scanners; and bottled liquid scanners. The effectiveness of these...BioWatch programs, which will be transferred from the Science and Technology Directorate (S&T), and the National Biosurveillance Integration System (NBIS...left in place following the reorganizations mentioned above. One notable exception was the transfer of the Biosurveillance sub-program to the new Office

  7. Quantifying a Negative: How Homeland Security Adds Value

    Science.gov (United States)

    2015-12-01

    Many studies and publications examine fire spread of closely spaced buildings, including “On Radiant Heat Transfer from Turbulent Flames” by Cox.4...flame effects how much radiant heat is put out. This study was the foundation for modeling fire spread in urban and wildland environments. In 2002...Technical Note 1600) (Washington, DC: National Institute of Standards and Technology, 2006). 4 Gordon Cox, “On Radiant Heat Transfer from Turbulent

  8. 78 FR 39301 - Committee name: Homeland Security Academic Advisory Council

    Science.gov (United States)

    2013-07-01

    ... recommendations to the Secretary and senior leadership on matters relating to student and recent graduate... Centers of Academic Excellence cybersecurity programs to the higher education community; how to define...

  9. The Role of the Corps of Engineers in Homeland Security

    Science.gov (United States)

    2007-11-02

    companies and pipe line companies could be required in a TF dealing with a coastal area or a large sea or river port. A revised model for the engineer...Hampshire, Vermont, Rhode Island, Connecticut, Mass) ELEMENT UNIT STATE COMPONENT Engineer RTF 240th EN GRP Maine Army NG HQ’s (CONST) Construction...Virginia, Virginia, Maryland, Delaware, and D.C.) ELEMENT UNIT STATE COMPONENT Engineer RTF 11 1th EN GRP WV Army NG HQ’s (COST) Construction BN 1092nd

  10. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Coast of the United States in 2005. In January 2013, U.S. Senator Harry Reid compared Hurricane Sandy to Hurricane Katrina. His comments indicated...163 Bruce Alpert , “Reid Says Hurricane Katrina was ‘Nothing in Comparison’ to Sandy,” The Times- Picayne...PAGE INTENTIONALLY LEFT BLANK 79 LIST OF REFERENCES Alpert , Bruce. “Reid Says Hurricane Katrina was ‘Nothing in Comparison’ to Sandy.” The Times

  11. Overview of Infrastructure Science and Analysis for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-07-21

    This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.

  12. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    Science.gov (United States)

    2014-09-01

    Eddie Reed, Eduardo J. Simoes, and M. M. Engel . “When Chronic Conditions Become Acute: Prevention and Control of Chronic Diseases and Adverse...Fewer Insured and $8.4 Billion Less in Federal Payments.” Health Affairs 32, no. 6 (2013): 1030–1036. Ringel, Jeanne S., Federico Girosi, Amado

  13. Does Homeland Security Constitute an Emerging Academic Discipline?

    Science.gov (United States)

    2013-03-01

    disciplines that make it easy for them to find a job and receive good pay. 7. Entrepreneurs will enter and firms will expand in sectors that promise to be...publication 12. Percent female students 3. Percent faculty with grants 13. Percent international students 4. Awards per allocated faculty member 14...time to degree 7. Percent female faculty 17. Percent students with academic plans 8. Average GRE scores 18. Student work space 9. Percent 1st-yr

  14. Legislating Civil Service Reform: The Homeland Security Act of 2002

    Science.gov (United States)

    2006-06-22

    stage for future agency-specific chapters for NASA , the SEC, DOD and DHS. 4. The George W. Bush Administration The George W. Bush administration came...they are going to follow your line because you control their pay, their determination at will, their layoff .”97 There were also questions about whether

  15. U.S. Army Special Forces and Homeland Security Operations

    Science.gov (United States)

    2008-03-01

    This force helped rescue people on the coast, but was soon diverted to help search for victims in New Orleans.96 Governor Arnold Schwarzenegger ...Governor, Arnold Schwarzenegger . September 1, 2005. 98 “Guard Adding 18 to Katrina Effort,” Deseret News (Salt Lake City, UT) September 14, 2005. 99...Governor, Arnold Schwarzenegger . September 1, 2005. 75 McGillis, Gay. “Organizing NORTHCOM for Success: A Theater Special Operations Command

  16. The Italian Army’s Role in Homeland Security

    Science.gov (United States)

    2003-04-07

    Roma: Stato Maggiore dell’Esercito – Reparto Impiego delle Forze, Ottobre 2000), B/1-2. 6 Norme di principio sulla disciplina militare, Legge 382, art...contrastare la criminalita` organizzata in Sicilia. Decreto-legge 349 (25 Luglio 1992). Norme di principio sulla disciplina militare. Legge 382 (11 Luglio

  17. The Development and Recognition of Homeland Security Law

    Science.gov (United States)

    2007-03-01

    and I owe them a continuing debt of gratitude. Finally, and most importantly, I am eternally grateful to my wife, Annie; son, Jim; and daughter...at the state or federal level, is familiar with the requirements of Freedom of Information Acts or state sunshine laws. Judge Advocates have the

  18. Enhancing Public Helicopter Safety as a Component of Homeland Security

    Science.gov (United States)

    2016-12-01

    the area to assist with neutralizing the threat, and they can also extract injured people for immediate medical care. Search and rescue is another...on scene reported the weather conditions as “very bad with strong winds, cold temperatures, snow or sleet, and...responders who run toward an active shooting scene while others are running away. This type of training cannot be applied to aviation since there is usually

  19. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    James Monroe in 1823 ( Martin , n.d.). There is also political doctrine, such as egalitarianism a “political doctrine that holds that all people...be able to engage a larger stakeholder community and avoid the need for a huge new bureaucracy (Linde, O’Brien, Lindstrom , Spiegeleire, Vayrynen...Presentation, Osan Air Force Base, South Korea. 74 Linde, E., O’Brien, K., Lindstrom , G., Spiegeleire, S., Vayrynen, M., & de Vries, H. (2002

  20. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    ... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment... will serve as an ex officio member of the Compensation Committee. DHS will provide technical staff to...

  1. Administrative corruption from sociology perspective and the relationship between administrative corruption and social security

    Directory of Open Access Journals (Sweden)

    Mohsen Zarei Jlyany

    2014-08-01

    Full Text Available certain principles Observance and non- Observance on organizing a social system will have Indisputable effect at the Organization. And administrative systems are not exempt from this, also the selection of the Administration components and also How to Place the components together can affect its performance. Meanwhile, the government's role in the prevalence or no-prevalence, the extent type and the way of administrative corruption influence, in this article, researchers wants to explore the reasonable cause of this procedure prevalence. So Thought owners by thinking more in this context, compensate Analysis deficiencies. Also following topics are included in this article, first of all. A Administrative corruption and social security definitions B Impact of administrative corruption on Social Security In terms of rational - traditional C the most important point of  Sociological Analysis And sociological theories relation with administrative corruption And relate these theories to deviations And its role in administrative corruption cases have been investigated.

  2. Perspectives of the National Army of the Republic of Moldova under The New Regional Security Architecture

    Directory of Open Access Journals (Sweden)

    Gheorghe MEREUŢĂ

    2014-12-01

    Full Text Available Currently, the security complex from the South-East Europe, situated in the area of modern confrontation between the major European powers (Germany, Russia, Great Britain and France, is undergoing a profound political, economic and military restructuring. The USA and NATO, within the UN and OSCE, as well as through other institutions, control the most significant local developments. The concept was imposed by the new politico-military coordinates in Europe and in the world, the limitations of armaments, and the new military relations established in the world. National Army of the Republic of Moldova (hereinafter National Army passes through a complex process of restructuring / modernization. Implemented operational measures and actions, and those that need to be implemented in the next period, refer to the development in the security environment in the area of interest of the Republic of Moldova. Classification-JEL: A23

  3. Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective

    Directory of Open Access Journals (Sweden)

    Peiyi Han

    2016-01-01

    Full Text Available The primary business challenge for the customers to use outsourced computation and storage is the loss of data control and security. So encryption will become a commodity in the near future. There is big diffusion with the above scenario: take advantage of current application’s full functionalities at the same time ensuring their sensitive data remains protected and under customers’ control. Prior works have achieved effective progress towards satisfying both sides. But there are still some technical challenges, such as supporting file or data-stream based applications and supporting full-text and advanced searches. In this paper, a novel security broker based encrypted data search scheme, called Enc-YUN, is proposed, which transparently builds a reverse index at the security broker when the data flow is transmitted to the cloud. And search firstly takes place on the index, in which the mapping structure corresponds to and retrieves the very encrypted data in the cloud on behalf of the client. With this scheme, updated-to-date full-text search techniques can be easily integrated to carry out the most advanced search functionalities, at the same time, maintaining the strongest levels of data protection from curious providers or third parties. Experimental results show that Enc-YUN is effective with broad categories of cloud applications, and the performance overhead induced is minor and acceptable according to user’s perceptual experience.

  4. New perspectives in ecosystem services science as instruments to understand environmental securities.

    Science.gov (United States)

    Villa, Ferdinando; Voigt, Brian; Erickson, Jon D

    2014-04-05

    As societal demand for food, water and other life-sustaining resources grows, the science of ecosystem services (ES) is seen as a promising tool to improve our understanding, and ultimately the management, of increasingly uncertain supplies of critical goods provided or supported by natural ecosystems. This promise, however, is tempered by a relatively primitive understanding of the complex systems supporting ES, which as a result are often quantified as static resources rather than as the dynamic expression of human-natural systems. This article attempts to pinpoint the minimum level of detail that ES science needs to achieve in order to usefully inform the debate on environmental securities, and discusses both the state of the art and recent methodological developments in ES in this light. We briefly review the field of ES accounting methods and list some desiderata that we deem necessary, reachable and relevant to address environmental securities through an improved science of ES. We then discuss a methodological innovation that, while only addressing these needs partially, can improve our understanding of ES dynamics in data-scarce situations. The methodology is illustrated and discussed through an application related to water security in the semi-arid landscape of the Great Ruaha river of Tanzania.

  5. Effective therapeutic milieus in secure services for women: the service user perspective.

    Science.gov (United States)

    Long, C G; Knight, C; Bradley, L; Thomas, M

    2012-12-01

    Women in secure setting represent a group for whom gender sensitive treatments are only emergent. Service users are viewed as participants in treatment developments. However, the opinions of forensic patients have, in contrast to other service users, been under researched. To identify service users' views of the constituents of an effective therapeutic milieu for women in secure settings and to help identify the extent to which services need to be specifically tailored for women. A qualitative service user-led participatory research approach was used. Two focus groups with service users from low and medium secure settings discussed the ingredients of an effective therapeutic milieu based on their experience of gender-specific treatment. Group transcripts were subjected to thematic analysis. Themes identified covered interpersonal relationships; treatment programming; service user empowerment; the ward as a place of safety; and hope for the future. Participants did not highlight gender-specific issues despite this being implicit in focus group questions. Findings echo themes from other psychiatric settings and provide a much needed consensus between service providers and users on which to base healthcare planning. The elucidation of gender-specific factors in effective therapeutic milieus requires more focussed research.

  6. Contemporary Issues of Peace and Security in Plateau State, Nigeria: The Traditional and Political Perspectives

    Directory of Open Access Journals (Sweden)

    Gwaza, P. A.

    2015-08-01

    Full Text Available This work examines contemporary challenges to peace and security in Plateau State. It argues that the intractable and internecine conflict dynamics reflects a constant clash between the traditional and human conceptions of security. The clash is made possible by Nigeria’s historical experiences in colonial and military dictatorships, which sustained the deployment of military hardware in State responsiveness to every conflict situations. In interpreting these scenarios, the work deploys classical historical, analytical and comparative research methods. The conception of security in post world war era was anchored on the protection and preservation of the State’s territorial integrity, sovereignty and the regime in power. This trend however changes at the end of cold war to the protection and preservation of the national, who now becomes the primary unit of analysis and who is meant to live under socio-economic and political conditions that seek to guarantee the twin values of freedom from fear and freedom from want. It concludes that the zero-sum and militarist-driven approach may fail to address the historical, political, and socio-economic roots of conflict on the Plateau.

  7. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  8. TSA Security Checkpoint Wait Times – API (PMIS)

    Data.gov (United States)

    Department of Homeland Security — TSA operational data including: Airport wait time (hourly) data Airport throughput (hourly) data Prohibited item (hourly) data Monthly Objectives Report (MOR) data...

  9. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-09-09

    ... via a web enabled interactive online format and teleconference line. To participate via teleconference... advice, consults with, and makes recommendations to the Secretary of Homeland Security, via...

  10. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-03-18

    ... web enabled interactive online format and teleconference line. To participate via teleconference, dial..., consults with, and makes recommendations to the Secretary of Homeland Security, via the Commandant of...

  11. Framework of SAGI Agriculture Remote Sensing and Its Perspectives in Supporting National Food Security

    Institute of Scientific and Technical Information of China (English)

    SHI Yun; JI Shun-ping; SHAO Xiao-wei; TANG Hua-jun; WU Wen-bin; YANG Peng; ZHANG Yong-jun; Shibasaki Ryosuke

    2014-01-01

    Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful within large scale agriculture applications (such as on a national or provincial scale), it may not supply sufifcient information with adequate resolution, accurate geo-referencing, and specialized biological parameters for use in relation to the rapid developments being made in modern agriculture. Information that is more sophisticated and accurate is required to support reliable decision-making, thereby guaranteeing agricultural sustainability and national food security. To achieve this, strong integration of information is needed from multi-sources, multi-sensors, and multi-scales. In this paper, we propose a new framework of satellite, aerial, and ground-integrated (SAGI) agricultural remote sensing for use in comprehensive agricultural monitoring, modeling, and management. The prototypes of SAGI agriculture remote sensing are ifrst described, followed by a discussion of the key techniques used in joint data processing, image sequence registration and data assimilation. Finally, the possible applications of the SAGI system in supporting national food security are discussed.

  12. [Perspectives on veterinary public health, food security, and the "One Health" joint initiative].

    Science.gov (United States)

    Cartín-Rojas, Andrés

    2014-09-01

    Veterinarians play a key role in food security. The health of millions of people, stimulation of national economies, development of sustainable livestock production related to this food source, and the different agricultural production systems that compose value chains, and access to more profitable international markets all depend on their efficient and transparent work. Shifting nutritional patterns globally, along with expected population growth, and the increase in marketable food commodity routes and volumes, forecast that demand for animal source food will steadily intensify over the coming decades. To successfully address these challenges, the veterinary profession should establish more practical and up-to-date conceptual and methodological frameworks for academic and professional profiles, focusing the profession on the different public health subject areas, in undergraduate and graduate courses. Furthermore, interdisciplinary alliances should also be developed--such as the "One Health" approach proposed by the United Nations Food and Agriculture Organization (FAO), the World Organization for Animal Health (OIE), and the World Health Organization (WHO)--to establish frameworks for joint work and public policies more in line with the domestic conditions of Latin American countries, using a collaborative, sustainable, and comprehensive approach to animal health, food security, and public health policy.

  13. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  14. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    Energy Technology Data Exchange (ETDEWEB)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.

  15. Food security and marine capture fisheries: characteristics, trends, drivers and future perspectives.

    Science.gov (United States)

    Garcia, Serge M; Rosenberg, Andrew A

    2010-09-27

    World population is expected to grow from the present 6.8 billion people to about 9 billion by 2050. The growing need for nutritious and healthy food will increase the demand for fisheries products from marine sources, whose productivity is already highly stressed by excessive fishing pressure, growing organic pollution, toxic contamination, coastal degradation and climate change. Looking towards 2050, the question is how fisheries governance, and the national and international policy and legal frameworks within which it is nested, will ensure a sustainable harvest, maintain biodiversity and ecosystem functions, and adapt to climate change. This paper looks at global fisheries production, the state of resources, contribution to food security and governance. It describes the main changes affecting the sector, including geographical expansion, fishing capacity-building, natural variability, environmental degradation and climate change. It identifies drivers and future challenges, while suggesting how new science, policies and interventions could best address those challenges.

  16. The right to secure food in the perspective of the general improvement of the fundamental rights.

    Science.gov (United States)

    Rodotà, Stefano

    2010-01-01

    The 9th International Congress of the European Society EurSafe (European Society of Agricultural and Food Ethics) was held on September 15-18, 2010, in Bilbao, Spain, gathering 150 experts from more than 20 countries, with the purpose of reflecting on ethical-social and legal issues posed by bio-scientific advances and the challenges of agriculture and food in the Third Millennium. Under the motto "Global Food Security: Ethical and Legal Challenges", the Congress was organized by the Inter-University Chair in Law and the Human Genome and particular attention was paid to the need to improve access to sufficient, nutritionally adequate and safe food for all humankind, and to the socio-economic and political obstacles which, from day to day, impede this access, given that twenty years after taking on the Millennium Objectives, poverty and hunger have not only failed to decline, but continue to reach record figures. Professor Stefano Rodotà, member of the European Group on Ethics in Science and New Technologies, deserves a special mention. That Group, independent and multidisciplinary, was created for the purpose of advising the European Commission on ethical aspects of science and new technologies in connection with the preparation and implementation of Community legislation and policy. Below we reproduce the speech given by Professor Stefano Rodotà during the EurSafe 2010 Congress's Plenary Session hold in Bilbao, 17th September 2010.

  17. American perspectives on security : energy, environment, nuclear weapons, and terrorism : 2010.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK); Silva, Carol L. (University of Oklahoma, Norman, OK)

    2011-03-01

    We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findings from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  18. Sustaining Statewide Disaster Response Capabilities from a Fire Service Perspective

    Science.gov (United States)

    2013-03-01

    quote was taken from an abstract written by Jena Baker McNeill , who is a Senior Policy Analyst for homeland security for the Heritage Foundation... McNeill , 2011). The President’s 2012 budget request would maintain homeland security funding at current levels, but the budget request would increase...of Arts (Security Studies)). Naval Postgraduate School, Monterey, California. (743227784). McNeill , J. B. (2011). Checkbook homeland security

  19. The roles of maternal mind-mindedness and infant security of attachment in predicting preschoolers' understanding of visual perspective taking and false belief.

    Science.gov (United States)

    Laranjo, Jessica; Bernier, Annie; Meins, Elizabeth; Carlson, Stephanie M

    2014-09-01

    This study is a follow-up to a previous study that examined two aspects of mother-child relationships-mothers' mind-mindedness and infant attachment security-in relation to toddlers' early manifestations of theory of mind understanding at 2 years of age. The current study aimed to assess the same two aspects of mother-child relationships in relation to children's (N=59) theory of mind performance at 4 years of age. Results of the current study confirmed and expanded on relations observed at 2 years. Mothers' use of appropriate mind-related comments specifically during toy-based free play at 12 months of age predicted preschoolers' understanding of false belief and Level 2 visual perspective taking over and above earlier perspective-taking abilities. Furthermore, more securely attached boys, but not girls, performed better on a task requiring Level 2 visual perspective taking. The similarity of results across the two time points suggests the reliability of associations among mothers' use of mind-related comments during toy-based play, boys' attachment security, and children's subsequent social understanding. The current results also suggest that maternal mind-mindedness may be most relevant to children's social cognition when assessed in toy-based play contexts.

  20. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  1. 49 CFR 1580.105 - Reporting significant security concerns.

    Science.gov (United States)

    2010-10-01

    ... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  2. 49 CFR 1580.203 - Reporting significant security concerns.

    Science.gov (United States)

    2010-10-01

    ..., Scenic, Historic and Excursion Operators, and Private Cars § 1580.203 Reporting significant security... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.203... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  3. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A...

  4. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... Security (AMS) Plan. 103.505 Section 103.505 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.505 Elements of the Area Maritime Security (AMS) Plan. The AMS Plan should address...

  5. 33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Area Maritime Security (AMS) Plan... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be...

  6. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  7. Native Peoples-Native Homelands Climate Change Workshop: Lessons Learned

    Science.gov (United States)

    Maynard, N. G.

    2003-12-01

    The Native Peoples-Native Homelands Climate Change Workshop was held on October 28 through November 01, 1998, as part of a series of workshops being held around the U.S. to improve the understanding of the potential consequences of climate variability and change for the Nation. This workshop was specifically designed by Native Peoples to examine the impacts of climate change and extreme weather variability on Native Peoples and Native Homelands from an indigenous cultural and spiritual perspective and to develop recommendations as well as identify potential response actions. The workshop brought together interested Native Peoples, representatives of Tribal governments, traditional elders, Tribal leaders, natural resource managers, Tribal College faculty and students, and climate scientists from government agencies and universities. It is clear that Tribal colleges and universities play a unique and critical role in the success of these emerging partnerships for decision-making in addition to the important education function for both Native and non-Native communities such as serving as a culturally- appropriate vehicle for access, analysis, control, and protection of indigenous cultural and intellectual property. During the discussions between scientists and policy-makers from both Native and non-Native communities, a number of important lessons emerged which are key to building more effective partnerships between Native and non-Native communities for collaboration and decision-making for a more sustainable future. This talk summarizes the key issues, recommendations, and lessons learned during this workshop.

  8. Perspective: border security in the age of globalization: how can we protect ourselves without losing the benefits of openness?

    OpenAIRE

    Peter Andreas

    2003-01-01

    Border security has become increasingly important since 9-11. Yet the benefits of globalization depend on moving people and goods across national boundaries. How can we improve border security without losing the benefits of openness?

  9. Department of National Security Affairs [presentation

    OpenAIRE

    2016-01-01

    A slide presentation. The Department of National Security Affairs (NSA) offers fully accredited programs leading to the Master of Arts in Security Studies, as well as a Ph.D. program in Security Studies. In addition to specializing in traditional security domains such as nuclear proliferation, arms control, maritime strategy, interstate wars, insurgency, terrorism and homeland security, the NSA department conducts cutting edge research and education in the areas of cyber warfare, space politi...

  10. HYPERSONIC THREATS TO THE HOMELAND STRATEGIC OPTIONS

    Science.gov (United States)

    2017-03-28

    Fighter Squadron, Homestead Air Reserve Base Florida, Director of Operations 80th Fighter Squadron, 8 FW, Kunsan AB, Korea. Lt Col Jeffress...homeland, safeguards the decision space of our nation’s leaders and potentially strengthens military, diplomatic and economic instruments of power... leaders cannot default on their oath to support and defend the constitution against this emergent threat as they prioritize tasks for the administration

  11. Identity Development in the Ancestral Homeland: A Chinese Heritage Perspective

    Science.gov (United States)

    Jing-Schmidt, Zhuo; Chen, Jing-Yun; Zhang, Zhen

    2016-01-01

    This study examines the lived experiences of identity of 4 Chinese Heritage Language (CHL) students participating in a year-long study abroad program in China. In a narrative inquiry, we draw on 2 mutually complementary theoretical frameworks--the Theory of Communities of Practice (Wenger, 1998) and Self-Categorization Theory (Turner et al.,…

  12. The Approaches to Narrowing Urban-Rural Income Gap——From the Perspective of Rural Social Security

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    From the situations about the incomes and life quality of the urban and rural residents,the thesis briefly introduces the status quo of the urban-rural income gap and explores the impact of the income gap on social economy:firstly,it hampers economic development;secondly,it is detrimental to the social development.Then the thesis analyzes the role of a sound social security in narrowing urban-rural income gap:at first,it broadens the institutional environment of improving the agricultural efficiency;secondly,it eliminates the uncertainties influencing the farmers’ income;thirdly,it improves the farmers’ capacity to increase income;at last,it enhances the farmers’ consciousness of wealth.Next the thesis inquires into the problems existing in the system of rural social security:the first problem is more obviously fragmented system;the second is inadequate security projects and narrower coverage;the third is an obvious lack of equality in urban and rural security;the fourth is even less sound management system;the last is the lagging of legislation.Afterwards the thesis proposes the countermeasures and suggestions to improve the system of rural social security and narrow urban-rural income gap:firstly,to integrate the social security system in rural areas;secondly,to perfect security projects and enhance the security system;thirdly,to integrate the administrative management of social security;at last,to enforce the legal system.

  13. IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective

    CERN Document Server

    Dattani, Dinesh D

    2013-01-01

    Rather than rehashing basic information-such as command syntax-already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organizations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and soluti

  14. Naval Mine Countermeasures: The Achilles Heel of U.S. Homeland Defense

    Science.gov (United States)

    2013-05-20

    further credence to this claim, the same document quotes John Brennan, then Assistant to the President for Homeland Security and Counterterrorism...SMCM), MH-53E airborne MCM (AMCM) helicopters, and explosive ordinance disposal (EOD) teams that operate remote MCM vehicles and employ marine mammal...result these new technology assets are not projected to enter initial operational test and evaluation ( IOT &E) until mid-2014 at the earliest. 21

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  16. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  17. Developing an analytical model to increase urban security from the Secured perspective by Designing (SBD Approach using fuzzy AHP method (case study: region 17 of Tehran

    Directory of Open Access Journals (Sweden)

    H. Zabihi

    2013-01-01

    Full Text Available Extended abstract1-IntroductionSafety and security have been significant issues throughout history, from early prehistoric cave-dwelling societies to medieval and modern cities (P. Cozens, 2008. Crime is a part of our way of living. It is tied to the physical distribution of people and objects, to the routine activity patterns of daily life, and to the ways in which people perceive and use information about the environment (Brantingham & Brantingham, 1993. Statistics show that there is a meaningful relationship between different districts and kind and repetition of crimes in Tehran, so that these districts can be categorized based on city safety (Rezvan, 2007In some regions unsafely is more likely due to environmental, social, economic and even occupational reasons. One of these areas is region 3 of district 17 in Tehran, which suffers from high population density, aggregation of deteriorated and compact areas, multiplicity of cross-regional land use, separation of the area by two railways (Tehran-Tabriz and Tehran- South, etc. Mentioned limitations along with other relevant factors, has created numerous problems such as low level of urban security in the area and feeling of insecurity among residents.2- Theoretical basesSecured by design is a UK based initiative which was devised in1989, with the aim of countering the rise in household burglary, reducing crime through the design of the environment and encouraging urban designers to design out crime at the planning stage (Armitage, 2004. SBD also aims to achieve security for the building shell and to introduce appropriate internal and external design features that facilitate natural surveillance and create a sense of ownership and responsibility, in order to deter criminal and anti-social behavior within the cartilage of the business. New opportunity theories of crime and crime prevention measures such as situational crime prevention and crime prevention through environmental design largely

  18. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-07-21

    ... government to complete a cyber network security assessment so that a full measure of gaps and capabilities... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD),...

  19. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-04-21

    ... a cyber network security assessment so that a full measure of gaps and capabilities can be completed... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate...

  20. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  1. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... including: Evaluations or reports; Attendance at treatment or counseling programs; or Substance abuse... authorities to report, under state law, incidents of suspected child abuse or neglect to the extent described... or mental health counseling, treatment or evaluation. G. To the appropriate federal, state,...

  2. Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense

    Science.gov (United States)

    2012-05-17

    Principles in the Space and Information Age (New York: Frank Cass-Taylor & Francis , 2005), 36. 38 Andrew Krepinevich and Robert O. Work, A New US Global...Principles in the Space and Information Age. New York: Frank Cass-Taylor & Francis , 2005. Jeffreys-Jones, Rhodri. The FBI: A History. New Haven, CT... Bacon , 1971. Swain, Richard M. Lucky War: Third Army in Desert Storm. Washington, DC: U.S. Army Center of Military History, 1997. Turabian, Kate L. A

  3. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    difficult times. MLM , the “get done with that so you can visit more” mantra provided a lighthearted push to keep going. My Classmates Your varied...its down falls and should be used sparingly. Contracts between organizations provide the moral code by which they will interact. If policy makers

  4. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    we live on two volcanic rocks where two tectonic plates meet, in a somewhat lonely stretch of windswept ocean just above the Roaring Forties. If you...Management and Business Continuity Programs NGO non-government organization NIMS National Incident Management System NMSZ New Madrid seismic ...the New Madrid seismic zone22 and the Cascadia subduction zone along the northwest Pacific coast.23 An earthquake along the Cascadia fault lines

  5. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Science.gov (United States)

    2010-04-13

    ... a description denoting the type and character of each system of records that the agency maintains... records prepared by TSA employees, and responses to and results of approved psychological assessments or similar tests administered by TSA; (f) Results of telephonic or in-person interviews with program...

  6. Domestic Security Cooperation: A Unified Approach to Homeland Security and Defense

    Science.gov (United States)

    2012-09-01

    Cartel, La Familia De Michoacan, the Juarez cartel, the Beltran Leyva Organization (BLO), and the Tijuana cartel. These organizations compete with each...to “expand operations into the territories of other cartels—and further challenge the sovereignty of the Mexican state.”35 The La Familia cartel...gains control of the populace and furthers its aims by infiltrating social, political, and religious organizations. La Familia uses religion to portray

  7. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    India; Indonesia; Iraq; Jerusalem, Israel; Jordan; Kuala Lumpur , Malaysia; Kuwait; Lebanon; Mexico; Morocco; Nigeria; Pakistan...merely administer the visa process. They warn that consular officers are too concerned about facilitating tourism and trade to scrutinize visa...consular officers emphasize the promotion of tourism , commerce, and cultural exchange and are lax in screening foreign nationals who want to come

  8. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ...). Portions of the system pertaining to investigations or prosecutions of violations of criminal law are... prosecution of violations or potential violations of Federal, State, local, or international criminal law... information, indicates a violation or potential violation of law, which includes criminal, civil,...

  9. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... other restrictions pertaining to airspace. (g) Other individuals who are connected to the transportation... indirect air carrier. (j) Aliens or other individuals designated by DHS/TSA who apply for flight training... and past citizenship information; immigration status; alien registration numbers; visa...

  10. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    Science.gov (United States)

    2008-12-01

    following individuals and their private sector companies: Mrs. Yvette Limon , Assistant Director City of Laredo Bridge Department; Mr. Skip McMahon, of...Mrs. Yvette Limon , Assistant Director City of Laredo Bridge Department, phone and e-mail interviews with the author, August 2008. 42 vehicles during

  11. Homeland Security Within State Departments of Agriculture: Success Factors and Barriers to an Effective Security Program

    Science.gov (United States)

    2010-09-01

    2010 Thesis Co-Advisors: Samuel H. Clovis Gail F. Thomas THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No...DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2010 Author: Matthew J. Blackwood, PhD Approved by: Samuel H. Clovis , PhD...that I can give my children the same gifts you gave me love, support, and the desire to learn. To my advisors, Dr. Sam Clovis and Dr. Gail Thomas

  12. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... federal government's counter-terrorism efforts by assisting in the detection of individuals on federal... and Terrorism Prevention Act of 2004 (IRTPA),\\2\\ Congress directed TSA and DHS to assume from aircraft... General to establish an organization to consolidate the Federal Government's approach to terrorism...

  13. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    Robotics: The Key to Immediate Assessment & Response to Hazardous Situations, Mr. Alan Bignall, CEO, ReconRobotics Using Modeling and Simulation for...Corporation 9:20 am Reconnaissance Robotics: The Key to Immediate Assessment & Response to Hazardous Situations • Mr. Alan Bignall, CEO...Department of Employment and Economic Development 3:25 pm Prevention of Terrorism & Industry’s Role • Mr. Sam Brinkley , Vice

  14. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... to the media when there exists a legitimate public interest in disclosing information. Release under... Handgun Violence Prevention Act. Both routine uses are duplicative. The retention and disposal section has... settlement negotiations or in connection with criminal law proceedings. R. To the news media and the...

  15. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs) in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Science.gov (United States)

    Koo, Fung Kuen; Chen, Xi; Chow, Eric P F; Jing, Jun; Zheng, Jun; Zhao, Junshi; Zhang, Lei

    2015-01-01

    This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs) and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1) participants' attitudes towards NSPs, (2) participants' opinions on the effectiveness and barriers of NSPs, and (3) suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division). Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34) regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24) questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Afghanistan’s Security Environment

    Science.gov (United States)

    2009-11-05

    continue to depend on treacherous overland routes. Although sensitive equipment is flown in by plane, supply convoys moving overland from Pakistan...Lieberman Chair The Honorable Susan M. Collins Ranking Member Committee on Homeland Security and Governmental Affairs United States Senate

  18. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Science.gov (United States)

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  19. Perspectives

    Science.gov (United States)

    Tarone, Elaine

    2013-01-01

    The topic of this "Perspectives" column is "Requiring a Proficiency Level as a Requirement for U.S. K-12 Teacher Licensure." In 1998, the American Council of Teachers of Foreign Languages (ACTFL) began to work with the National Council for Accreditation of Teacher Education (NCATE), which accredits teacher education programs…

  20. 78 FR 46358 - Extension of Agency Information Collection Activity Under OMB Review: Security Programs for...

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under... against acts of criminal violence and air piracy, and the introduction of explosives, incendiaries,...

  1. Security Dynamics of Cloud Computing

    OpenAIRE

    Khaled M. Khan

    2009-01-01

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as addressing security such as ‘bolting-in’ on the top of cloud computing may not work well. The paper attempts to portray the security spectrum necessary for...

  2. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  3. Distance Learning for Food Security and Rural Development: A Perspective from the United Nations Food and Agriculture Organization.

    Science.gov (United States)

    McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen

    2002-01-01

    The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…

  4. Understanding of the U.S. Asia-Pacific Security Strategy:From the “Convergent Security” Perspective

    Institute of Scientific and Technical Information of China (English)

    Wang; Lianhe

    2014-01-01

    The U.S. Asia-Pacific policy is at a turning point. The "rebalancing" strategy,structured and implemented during Obama’s first term has produced extensive and sustained impacts, but still needs further adjustment in the evolving situation of the Asia-Pacific region.During the second term, based on re-evaluation of U.S. national security interests and U.S.relationship with countries in the Asia-Pacific region, the Obama Administration carefully modifies its "Asia-Pacific rebalancing" strategy, gives it the obvious character of "convergent security". Under the guidance of "convergent security" strategy, the United States will continue to maintain its bilateral security commitments, and play the leading role through more planning or participating in regional multilateral mechanisms and multilateral initiatives.Shifting from the traditional position of prioritizing bilateralism to equal emphasis on bilateralism and multilateralism in strategic arrangements is considered to be the most realistic option for the United States to safeguard its interests in the Asia-Pacific region under the current domestic political and economic conditions.

  5. The security of energy infrastructure and supply in North Africa: Hydrocarbons and renewable energies in comparative perspective

    Energy Technology Data Exchange (ETDEWEB)

    Lacher, Wolfram, E-mail: wolfram.lacher@swp-berlin.org [Stiftung Wissenschaft und Politik/German Institute for International and Security Affairs (SWP), Berlin (Germany); Kumetat, Dennis, E-mail: d.kumetat@lse.ac.uk [Department of Geography and Environment, London School of Economics and Political Science, London (United Kingdom)

    2011-08-15

    While security risks to energy infrastructure and supply are frequently cited as a source of concern in the public debate on Europe's energy relationships with North Africa, few academic publications have addressed the issue to date. This article focuses on two potential threats to energy security in the North African context: first, intenational disruption of energy supplies by governments; second, attacks by non-state actors on energy infrastructure. Based on an analysis of North African security and energy geopolitics, the article provides an assessment of these threats as they have materialized with regard to existing energy industries, particularly oil and gas. The article then seeks to apply the findings to renewable energy schemes that are currently being discussed and developed, gauging the likelihood and impact of such threats materializing in respect to various technologies, and differentiating between different states of the region. Finally, the article provides recommendations for policy and further research needs for a successful common European-North African energy future. - Research Highlights: >Interest for investments into renewable energy projects in North Africa is growing. >Perceptions of political/security risks to renewables in North Africa are exaggerated. >Investment in renewables would boost interdependencies between Europe, North Africa. >Terrorist attacks unlikely to pose a major threat to renewables projects in North Africa.

  6. A critical perspective on the reform of Dutch social security law. The case of the life course arrangement

    NARCIS (Netherlands)

    Eleveld, Anja

    2012-01-01

    This study seeks an answer to the question how the establishment of the idea of individual savings schemes in Dutch collective social security law can be critically explained. The introduction of the Life Course Arrangement serves as a paradigmatic case for this study. Based on a (juridical) discour

  7. Distance Learning for Food Security and Rural Development: A Perspective from the United Nations Food and Agriculture Organization

    Directory of Open Access Journals (Sweden)

    Scott McLean

    2002-04-01

    Full Text Available This article introduces the work of the United Nations Food and Agriculture Organization (FAO, and describes its interest in the application of distance learning strategies pertinent to the challenges of food security and rural development around the world. The article briefly reviews pertinent examples of distance learning, both from the experience of FAO and elsewhere, and summarises a complex debate about the potential of distance learning in developing countries. The paper elaborates five practical suggestions for applying distance learning strategies to the challenges of food security and rural development. The purpose of publishing this article is both to disseminate our ideas about distance learning to interested professional and scholarly audiences around the world, and to seek feedback from those audiences.

  8. Public Perspectives of Mobile Phones' Effects on Healthcare Quality and Medical Data Security and Privacy: A 2-Year Nationwide Survey.

    Science.gov (United States)

    Richardson, Joshua E; Ancker, Jessica S

    2015-01-01

    Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.

  9. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu,...

  10. 19 CFR 122.181 - Definition of Customs security area.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Definition of Customs security area. 122.181 Section 122.181 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Access to Customs Security Areas § 122.181 Definition...

  11. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July...

  12. Small Combatants for the Homeland Defense Mission

    Science.gov (United States)

    2013-03-01

    maritime related terrorism, weapons proliferation, transnational crime, piracy, environmental destruction, and illegal seaborne immigration.”35 But...humanitarian assistance, development assistance, environmental response operations, and security assistance. HA/DR missions can be both reactive and...Piracies and Felonies committed on the high Seas, and Offences against the Law of Nations.”70 Some of the first missions of the Navy were raids against

  13. Discussion of Social Security Policy Fairness from the Gender Perspective%性别视角下的社会保障政策公平性探析

    Institute of Scientific and Technical Information of China (English)

    吴宏洛; 苏映宇

    2011-01-01

    In the development and change of sixty years of the construction and its policy design of social security policy in our country,the social gender awareness runs always.To discuss the process of the social policy from the gender perspective is help to understand the social gender value goal,means and effect of the social policy.Applying with the means of social gender analysis,referring from the change of social security policy in our country,the paper evaluated and reviewed systematically some province's social security and its operation to observe the practical effect of the social policy in our country.%我国社会保障制度建设及其政策设计的60年发展与变迁,社会性别意识贯穿始终。以性别视角对社会政策过程进行考察,有助于我们更加全面了解政策的社会性别价值目标、实现手段和靶向效果。运用社会性别分析方法,以我国社会保障制度变迁为参照系,对某省域的社会保障政策及其政策运行进行系统检视和评估,藉此观察我国社会政策的性别实践效果。

  14. Perspective

    DEFF Research Database (Denmark)

    Kussmann, Martin; Morine, Melissa J; Hager, Jörg

    2013-01-01

    We review here the status of human type 2 diabetes studies from a genetic, epidemiological, and clinical (intervention) perspective. Most studies limit analyses to one or a few omic technologies providing data of components of physiological processes. Since all chronic diseases are multifactorial...... of the complexity of T2DM, we propose a systems biology approach to advance the understanding of origin, onset, development, prevention, and treatment of this complex disease. This systems-based strategy is based on new study design principles and the integrated application of omics technologies: we pursue...

  15. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  16. [The end of discrimination in social security for the elderly? Some remarks on the consequences of the paradigm shift in a life course perspective on gender].

    Science.gov (United States)

    Fachinger, Uwe

    2008-10-01

    Trying to analyse the effects of the paradigm shift in the old age social security system in Germany (GRV) from a life cycle gender perspective yields light and shade - it is a conglomeration of individual- and family-specific transfers, financed by a mix of contributions and taxes, and with measures of explicit and implicit, intended and not intended ex-post and ex-ante redistribution and discrimination.The paradigm shift has increased the complexity of the system and created additional elements of gender specific discrimination as well as reduced established elements of the so called "social compensation". Furthermore, the relevance of complementary private and occupational pensions will increase absolute and relative due to the reduction of the pension level. This will raise the importance of earnings in old age especially those that are without any elements of social security compensation or without elements of recognition of activities beside employment. Overall the paradigm shift has intensified the discrimination of women in two ways and the pension privatisation has caused redistribution from the bottom to the top. In other words, there is an increase in inter- and intra-gender discrimination. Due to the changes and the emphasis of aspects of an independent old age security savings for women the norm of the "male breadwinner model" has increased. The importance of "providing one's own pension" additionally creates distribution conflicts within a partnership. Because of the necessity of constant payments over time within a private insurance and the changes of an individual income and gender-specific life cycle, conflicts may occur time and again. The dependence of life-long partnerships on each other is not reduced or abolished with the strengthening of the individualistic model of protection, but is qualitatively and quantitatively improved. Against this background, the measures of the statutory pension system which are aimed towards the situation of a

  17. What Price Security?

    Directory of Open Access Journals (Sweden)

    Donald C. Masters

    2009-01-01

    Full Text Available This article presents a critique of the Copenhagen Consensus Center's(CCC exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive procurement practices will also result in lower costs and higher returns on security investments.

  18. Searching for the Hmong People’s Ethnic Homeland and Multiple Dimensions of Transnational Longing: From the Viewpoint of the Hmong in Laos

    Directory of Open Access Journals (Sweden)

    Sangmi Lee

    2010-01-01

    Full Text Available This paper examines how Hmong people in the diaspora imagine each other and develop diverse and multidimensional types of longing in the absence of a “true” ethnic homeland. Even before the Hmong dispersed around the world after the Vietnam War, they never identified or agreed upon a “true” ethnic homeland. As a result, Hmong people have inevitably developed various other types of longing. The objects of these longings have been conceptually expanded to include a Hmong culture, a powerful leader, and a future time when Hmong will again be reunited. In this sense, I will examine the way Hmong people express their perspectives on their objects of longing in the absence of a “true” ethnic homeland by focusing on the viewpoints of some Hmong people residing in Laos. Based on my observations and analysis, I also propose to rethink the limitations of the dominant view about how Hmong imagine their ethnic homeland.Although current theoretical perspectives of transnationalism and “imagined community” have contributed to an understanding of the Hmong people’s imagination and their diasporic ethnic identity, those views cannot fully explain how Hmong people’s longing is not just associated with the lost homeland but can have multiple directions and meanings. These different types of longing expressed by the Hmong people suggest that diasporic communities can be maintainedwithout a territorial ethnic homeland.

  19. 76 FR 49503 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Airport Security

    Science.gov (United States)

    2011-08-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Renewal From OMB of One Current Public..., aircraft piracy, and the introduction of explosives, incendiaries, or weapons aboard an aircraft....

  20. 77 FR 63734 - Security Zone; James River, Kingsmill Resort, Williamsburg, VA

    Science.gov (United States)

    2012-10-17

    ...: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice of Proposed... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Security Zone; James River, Kingsmill Resort... establishing a temporary security zone on the James River in the vicinity of Kingsmill Resort...