WorldWideScience

Sample records for human engineered security

  1. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  2. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  3. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  4. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  5. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  6. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  7. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  8. Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.

    2010-01-01

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as

  9. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  10. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  11. Security and computer forensics in web engineering education

    OpenAIRE

    Glisson, W.; Welland, R.; Glisson, L.M.

    2010-01-01

    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security shou...

  12. Security and trust requirements engineering

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Zannone, N.; Aldini, A.; Gorrieri, R.; Martinelli, F.

    2005-01-01

    Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve

  13. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  14. Development of undergraduate nuclear security curriculum at College of Engineering, Universiti Tenaga Nasional

    Science.gov (United States)

    Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz

    2017-01-01

    The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy

  15. Systems Security Engineering Capability Maturity Model SSE-CMM Model Description Document

    National Research Council Canada - National Science Library

    1999-01-01

    The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering...

  16. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  17. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  18. Goal-Equivalent Secure Business Process Re-engineering

    DEFF Research Database (Denmark)

    Acosta, Hugo Andrés Lópes; Massacci, Fabio; Zannone, Nicola

    2008-01-01

    that they are somehow “equivalent”. In this paper we propose a method for passing from SI*, a modeling language for capturing and modeling functional, security, and trust organizational and system requirements, to business process specifications and vice versa. In particular, starting from an old secure business......The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue...... process, we reconstruct the functional and security requirements at organizational level that such a business process was supposed to meet (including the trust relations that existed among the members of the organization). To ensure that the re-engineered business process meets the elicited requirements...

  19. Model-based security engineering for the internet of things

    OpenAIRE

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  20. Spent fuel reprocessing system security engineering capability maturity model

    International Nuclear Information System (INIS)

    Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong

    2011-01-01

    In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)

  1. Securing Humanity - Situating 'Human Security' as Concept and Discourse

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2005-01-01

    markdownabstractAbstract The label ‘human security’ (HS) has attracted much attention since the 1994 Human Development Report, but there are numerous conflicting definitions and agendas and widespread scepticism. The Ogata-Sen Commission report Human Security Now has proposed a unified yet

  2. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  3. Security Engineering FY17 Systems Aware Cybersecurity

    Science.gov (United States)

    2017-12-07

    Security Engineering – FY17 Systems Aware Cybersecurity Technical Report SERC-2017-TR-114 December 7 2017 Principal Investigator: Dr...December 7, 2017 Copyright © 2017 Stevens Institute of Technology, Systems Engineering Research Center The Systems Engineering Research Center (SERC...supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD

  4. Human security from paradigm shift to operationalisation: job description for a human security worker

    NARCIS (Netherlands)

    Glasius, M.

    2008-01-01

    This article shows how human security has functioned as both a paradigm-shifting and a bridging concept, with its most significant implications being, first, the shift from a focus on state security to one on human rights, and, second, the indivisibility of physical and material security. The

  5. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  6. Human engineering

    International Nuclear Information System (INIS)

    Yang, Seong Hwan; Park, Bum; Gang, Yeong Sik; Gal, Won Mo; Baek, Seung Ryeol; Choe, Jeong Hwa; Kim, Dae Sung

    2006-07-01

    This book mentions human engineering, which deals with introduction of human engineering, Man-Machine system like system design, and analysis and evaluation of Man-Machine system, data processing and data input, display, system control of man, human mistake and reliability, human measurement and design of working place, human working, hand tool and manual material handling, condition of working circumstance, working management, working analysis, motion analysis working measurement, and working improvement and design in human engineering.

  7. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  8. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  9. Human Rights, Human Needs, Human Development, Human Security

    OpenAIRE

    Gasper, Des

    2009-01-01

    Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each has emerged within the United Nations world; each relies implicitly on a conceptualisation of human need; each has specific strengths. Yet mutual communication, understanding and co-operation are deficient, espec...

  10. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  11. EVALUATION OF ECONOMIC SECURITY NOVOSIBIRSK REGION (FOR EXAMPLE, A REGIONAL ENGINEERING

    Directory of Open Access Journals (Sweden)

    Lugacheva L. I.

    2014-12-01

    Full Text Available The article shows the importance of regional engineering for the Russian economy, it clarifies the factors of economic security of the Novosibirsk region (NSO. Analyzed the characteristics prevailing in the engineering industry, its competitive advantages. The research results of the export orientation of the regional engineering VAT: its direction and priorities; discusses the trends that influence the growth during the recovery has formed a new profile of its foreign economic relations. Threats identified in the development of engineering and to propose measures to overcome them to ensure the economic security of the region. The article deals with the problem-tional institutes provide for the sustainable development of regional engineering, discusses the possibility of using pub-lic-private partnerships. Sharing of risks and responsibilities between the subject of the Russian Federation, municipalities and entrepreneurs - one of the priorities in the creation of the necessary conditions for the economic security of the NSO.

  12. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  13. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  14. Security, Privacy, and Applied Cryptography Engineering

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...... and applications, high-performance computing in cryptology and cryptography in ubiquitous devices....

  15. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...

  16. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  17. Financial engineering on the corporate debt securities market of Ukraine

    OpenAIRE

    Bui, T.

    2009-01-01

    The approaches to the definition of financial engineering and its methods are highlighted, advisability of application of the new securities types created on the basis of financial engineering in Ukrainian corporate financing is grounded.

  18. Human Security: China’s Discourses and Experience

    Directory of Open Access Journals (Sweden)

    Xiao Ren

    2016-02-01

    Full Text Available This article addresses three research questions by elaborating on how the idea of human security is understood or defined by the government and social actors in China; how the distinction between the “protection” aspect and “empowerment” aspect of human security is understood and accepted; and what particular downside risks are perceived as pressing human security issues in China. Amongst these the major ones include air pollution, food security, and cyber security. The study reveals that, whilst as a term “human security” is not frequently used, there have been significant discussions leading to the consideration and implementation of various human security practices in China. The idea of human security has been firmly established and threats to human security detected. For both the government and academic community in China, human security and state security are not necessarily confrontational but can rather be combined, often complimenting each other. Recent developments in China are pointing to a positive direction in terms of human security in the country.

  19. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  20. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon.

    Science.gov (United States)

    Parmar, Parveen Kaur; Agrawal, Pooja; Goyal, Ravi; Scott, Jennifer; Greenough, P Gregg

    2014-01-01

    Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women.

  1. HUMAN SECURITY – BUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  2. Redefining Human Security for Vulnerable Migrants in East Asia

    Directory of Open Access Journals (Sweden)

    Jiyoung Song

    2015-01-01

    Full Text Available This article proposes human security as an analytical framework to understand the current trends of irregular migration (both forced and unauthorised in East Asia and revisits the seven pillars of human security defined in the 1994 Human Development Report by the United Nations Development Programme (UNDP. It explains how the concepts of human security are parallel to those prescribed in international human rights conventions but different in terms of the attitude towards states. Human security does not directly challenge state authority and adds a sense of urgency and moral authority that requires extra-legal measures by the states. The author argues that human security is the securitisation of human rights and is a better framework and policy discourse than human rights to engage with state and non-state actors, especially in East Asia where political leaders are more receptive to the former idea. The study draws examples from stateless Rohingyas, undocumented sex workers in Thailand and Singapore, trafficked brides from Vietnam and Cambodia, and smuggled North Korean refugees in China to demonstrate the nexus between human security and irregular migration.

  3. The study on network security based on software engineering

    Science.gov (United States)

    Jia, Shande; Ao, Qian

    2012-04-01

    Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.

  4. Human Rights, Human Needs, Human Development, Human Security - Relationships between four international human discourses.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    markdownabstractAbstract: Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and

  5. Human Rights, Human Needs, Human Development, Human Security : Relationships between four international 'human' discourses

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    textabstractHuman rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each

  6. Toward a Theory of Human Security

    OpenAIRE

    Tanaka, Akihiko

    2015-01-01

    Human security” has occupied a significant place in the global discourses of peace, development, and diplomacy, despite often made criticisms of its conceptual ambiguity. Arguing for the merit of a broader definition of human security, i.e. “the right of people to live in freedom and dignity, free from poverty and despair” (UN Resolution A/RES/66/290), this paper offers an interdisciplinary theoretical framework in which key aspects of human security are systematically laid out: types of thr...

  7. The Theoretical Aspects of the Security of Human Development

    OpenAIRE

    Markova Natalia S.; Demyanenko Alina A.

    2017-01-01

    The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethink...

  8. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  9. The production of human security in premodern and contemporary history

    OpenAIRE

    Zwierlein, Cornel; Graf, Rüdiger

    2010-01-01

    "Since the end of the Cold War, Human Security has become an important approach in international politics, law, and political science. In contrast to the so-called 'Westphalian System' that knows only states as subjects and objects of security, human security aims at the security of individual human beings if failed or failing states do not protect them nor provide for their basic needs. Thereby, such heterogeneous forms of security as security from war, food security, energy security or secu...

  10. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  11. The golden triangle of human dignity: human security, human development and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2004-01-01

    The success or failure of processes of democratization cannot be detached from processes of development related to the aspirations of people at the grassroots. Human rights, in a more theoretical terminology, require human development in order to enhance human security.

  12. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  13. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  14. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    Science.gov (United States)

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access

  15. Medical devices and human engineering

    CERN Document Server

    Bronzino, Joseph D

    2014-01-01

    Known as the bible of biomedical engineering, The Biomedical Engineering Handbook, Fourth Edition, sets the standard against which all other references of this nature are measured. As such, it has served as a major resource for both skilled professionals and novices to biomedical engineering.Medical Devices and Human Engineering, the second volume of the handbook, presents material from respected scientists with diverse backgrounds in biomedical sensors, medical instrumentation and devices, human performance engineering, rehabilitation engineering, and clinical engineering.More than three doze

  16. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  17. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  18. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  19. (Human Security in Central America: A Return to the Past?

    Directory of Open Access Journals (Sweden)

    Jordi Urgell García

    2007-02-01

    Full Text Available After having become one of the principal scenarios of the Cold War, the pacification and democratisation of Central America in the 1990s were forged under the protection of the Esquipulas Process and the birth of the concept of human security. The resulting model of security was founded on the Framework Treaty on Democratic Security, which incorporated some of the basic postulates of human security and became one of its first institutional implementations. Nevertheless, the performance of this model has been eclipsed and questioned by the evolution of events in Central America (such as the impact of 9-11 on security agendas or the emergence of new forms of violence in the region, which open the door to a new security instrument (the Rapid Reaction Force, generate fears about an eventual regression of Central America in the area of security and raise doubts about the habitual assumptions of human security.

  20. Child rights, right to water and sanitation, and human security.

    Science.gov (United States)

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  1. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  2. Gender, Conflict and Human Security in Nigeria: Challenges and ...

    African Journals Online (AJOL)

    ... buttress the inadequacies of human security in Nigeria; strategies were proffered to tackle these challenges. The paper concluded that once the strategies are critically looked into and steps are taken to implement them, certain prospects will accrue to gender human security network in Nigeria. Gender and Behaviour Vol.

  3. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  4. Analysis of appraisal tool of system security engineering capability maturity based on component

    International Nuclear Information System (INIS)

    Liu Zhenghai; Yang Xiaohua; Zou Shuliang; Liu Yachun; Xiao Jiantian; Liu Zhiming

    2012-01-01

    Spent Fuel Reprocessing is a part of nuclear fuel cycle and is the inevitably choice of nuclear power sustainable development. Reprocessing needs to face with radiological, criticality, chemical hazards. Besides using the tradition appraisal methods based on the security goals, it is a beneficial supplement that using the appraisal method of system security engineering capability maturity model based on the process. Experts should check and approve large numbers of documents during the appraisal based on system security engineering capability maturity model, so it is necessary that developing a tool to assist the expert to complete the appraisal. The method of developing software based on component is highly effective, nimble and reliable. Component technology is analyzed, the methods of extraction model domain components and general components is introduced, and the appraisal system is developed based on component technology. (authors)

  5. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  6. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  7. Human and Citizen Rights Guarantees While Providing Information Security

    Directory of Open Access Journals (Sweden)

    Serhii Yesimov

    2018-05-01

    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  8. A human engineering and ergonomic evaluation of the security access panel interface

    International Nuclear Information System (INIS)

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system's primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard

  9. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  10. Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks

    OpenAIRE

    Collantes, Maria I. Mera; Massad, Mohamed El; Garg, Siddharth

    2016-01-01

    With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure protocol or novel implementation that offers a competitive advantage. A promising solution to defend against reverse engineering attacks is IC camouflaging. In this work, we propose a new camouflaging technique based on t...

  11. Systems Security Engineering Capability Maturity Model (SSECMM), Model Description, Version 1.1

    National Research Council Canada - National Science Library

    1997-01-01

    This document is designed to acquaint the reader with the SSE-CMM Project as a whole and present the project's major work product - the Systems Security Engineering Capability Maturity Model (SSE- CMM...

  12. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  13. Local control stations: Human engineering issues and insights

    International Nuclear Information System (INIS)

    Brown, W.S.; Higgins, J.C.; O'Hara, J.M.

    1994-09-01

    The objective of this research project was to evaluate current human engineering at local control stations (LCSs) in nuclear power plants, and to identify good human engineering practices relevant to the design of these operator interfaces. General literature and reports of operating experience were reviewed to determine the extent and type of human engineering deficiencies at LCSs in nuclear power plants. In-plant assessments were made of human engineering at single-function as well as multifunction LCSs. Besides confirming the existence of human engineering deficiencies at LCSs, the in-plant assessments provided information about the human engineering upgrades that have been made at nuclear power plants. Upgrades were typically the result of any of three influences regulatory activity, broad industry initiatives such as INPO, and specific in-plant programs (e.g. activities related to training). It is concluded that the quality of LCSs is quite variable and might be improved if there were greater awareness of good practices and existing human engineering guidance relevant to these operator interfaces, which is available from a variety of sources. To make such human engineering guidance more readily accessible, guidelines were compiled from such sources and included in the report as an appendix

  14. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  15. Human subject research for engineers a practical guide

    CERN Document Server

    de Winter, Joost C F

    2017-01-01

    This Brief introduces engineers to the main principles in ethics, research design, statistics, and publishing of human subject research. In recent years, engineering has become strongly connected to disciplines such as biology, medicine, and psychology. Often, engineers (and engineering students) are expected to perform human subject research. Typical human subject research topics conducted by engineers include human-computer interaction (e.g., evaluating the usability of software), exoskeletons, virtual reality, teleoperation, modelling of human behaviour and decision making (often within the framework of ‘big data’ research), product evaluation, biometrics, behavioural tracking (e.g., of work and travel patterns, or mobile phone use), transport and planning (e.g., an analysis of flows or safety issues), etc. Thus, it can be said that knowledge on how to do human subject research is indispensable for a substantial portion of engineers. Engineers are generally well trained in calculus and mechanics, but m...

  16. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  17. Integrated Approach to Peace & Human Security in the 21st Century

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2016-10-01

    Full Text Available Humanity has made remarkable progress during the past two centuries in advancing peace, democracy, human rights, economic development and social equality. The evolution of human relations has progressed far from the time when physical violence, war and conquest were the predominant form of international relations. Diplomacy has evolved from political negotiations at the conference table to mutually beneficial economic exchange and creative cultural integration. But the ideal of peace and human security for all human beings remains elusive, distant and utopian. Violence and insecurity persist and social harmony is threatened by the competition for political supremacy, markets, jobs and scarce resources. Thousands of nuclear weapons remain armed and on alert. Existential ecological threats increase daily. The roots of war and violence remain intact, even if their most horrendous expressions have receded from view. The permanent abolition of war and achievement of human security for all cannot be attained by narrowly conceived political alliances or collective security agreements. The negative concept of peace as the absence of war needs to be replaced by a positive conception of peace as the essential condition for the fullest development of human potential. The narrow concept of security in military and political terms needs to be replaced by an inclusive conception that views security as an emergent property of effective and harmonious social organization founded on the ultimate value of the human being. Peace and security are fundamental attributes of society as a whole. They can only be achieved by a comprehensive, integrated approach that addresses the roots of violence and disharmony in all forms—political, military, economic, social, cultural and ecological. This will require radical democratization of international institutions, establishment of an effective global legal process, abandonment of outmoded conceptions of national

  18. Results in Developing an Engineering Degree Program in Safeguards and Security of Nuclear Materials at Moscow Engineering Physics Institute

    International Nuclear Information System (INIS)

    Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2007-01-01

    The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training

  19. Human Factors Interface with Systems Engineering for NASA Human Spaceflights

    Science.gov (United States)

    Wong, Douglas T.

    2009-01-01

    This paper summarizes the past and present successes of the Habitability and Human Factors Branch (HHFB) at NASA Johnson Space Center s Space Life Sciences Directorate (SLSD) in including the Human-As-A-System (HAAS) model in many NASA programs and what steps to be taken to integrate the Human-Centered Design Philosophy (HCDP) into NASA s Systems Engineering (SE) process. The HAAS model stresses systems are ultimately designed for the humans; the humans should therefore be considered as a system within the systems. Therefore, the model places strong emphasis on human factors engineering. Since 1987, the HHFB has been engaging with many major NASA programs with much success. The HHFB helped create the NASA Standard 3000 (a human factors engineering practice guide) and the Human Systems Integration Requirements document. These efforts resulted in the HAAS model being included in many NASA programs. As an example, the HAAS model has been successfully introduced into the programmatic and systems engineering structures of the International Space Station Program (ISSP). Success in the ISSP caused other NASA programs to recognize the importance of the HAAS concept. Also due to this success, the HHFB helped update NASA s Systems Engineering Handbook in December 2007 to include HAAS as a recommended practice. Nonetheless, the HAAS model has yet to become an integral part of the NASA SE process. Besides continuing in integrating HAAS into current and future NASA programs, the HHFB will investigate incorporating the Human-Centered Design Philosophy (HCDP) into the NASA SE Handbook. The HCDP goes further than the HAAS model by emphasizing a holistic and iterative human-centered systems design concept.

  20. Security Implications of Human-Trafficking Networks

    Science.gov (United States)

    2007-06-15

    to those security concerns. Background How is Human Trafficking Carried Out? While trafficking victims are often found in sweatshops , domestic...labor. This type of trafficking is often found in agricultural labor, the production of goods (typically called sweatshops ) and construction labor

  1. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  2. Adaptive engineering management tools of enterprise economic security

    Directory of Open Access Journals (Sweden)

    G.E. Krokhicheva

    2018-06-01

    Full Text Available This paper discusses the organizational and methodological foundations and methods exploited to forecast, analyze and scale down threats and risks in the sphere of economic security, to solve the adaptation problems, to implement and to evaluate of the potency of protective measures. The object of the conducted research is associated with various economic activities of the commercial enterprises affiliated in Rostov region. A suggested model of the formation and functioning of adaptive engineering tools for managing economic security in the form of derivative balance of the enterprise resources and the sources of their formation will allow the proprietors, executive board and mana-gerial staff to obtain necessary information within the requested context regarding the enterprise vital economic interests. In addition, the paper pays attention to the methodological aspects of accounting description and estimation of the iterative achievements to meet the desired adaptation results, implemented within the framework of the described iterative algorithm aimed at ensuring strategic prediction.

  3. Knowledge-based personalized search engine for the Web-based Human Musculoskeletal System Resources (HMSR) in biomechanics.

    Science.gov (United States)

    Dao, Tien Tuan; Hoang, Tuan Nha; Ta, Xuan Hien; Tho, Marie Christine Ho Ba

    2013-02-01

    Human musculoskeletal system resources of the human body are valuable for the learning and medical purposes. Internet-based information from conventional search engines such as Google or Yahoo cannot response to the need of useful, accurate, reliable and good-quality human musculoskeletal resources related to medical processes, pathological knowledge and practical expertise. In this present work, an advanced knowledge-based personalized search engine was developed. Our search engine was based on a client-server multi-layer multi-agent architecture and the principle of semantic web services to acquire dynamically accurate and reliable HMSR information by a semantic processing and visualization approach. A security-enhanced mechanism was applied to protect the medical information. A multi-agent crawler was implemented to develop a content-based database of HMSR information. A new semantic-based PageRank score with related mathematical formulas were also defined and implemented. As the results, semantic web service descriptions were presented in OWL, WSDL and OWL-S formats. Operational scenarios with related web-based interfaces for personal computers and mobile devices were presented and analyzed. Functional comparison between our knowledge-based search engine, a conventional search engine and a semantic search engine showed the originality and the robustness of our knowledge-based personalized search engine. In fact, our knowledge-based personalized search engine allows different users such as orthopedic patient and experts or healthcare system managers or medical students to access remotely into useful, accurate, reliable and good-quality HMSR information for their learning and medical purposes. Copyright © 2012 Elsevier Inc. All rights reserved.

  4. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  5. Applications of human factors engineering in the digital HMI

    International Nuclear Information System (INIS)

    Zhou Bingjian

    2014-01-01

    In order to prevent and minimize human errors in the digital main control room, the principles of human factors engineering must be complied strictly in the design process of digital human-machine interface. This paper briefly describes the basic human factors engineering principles of designing main control room, introduces the main steps to implement the human factors engineering verification and validation of main control room, including HSI task support verification, human factors engineering design verification and integrated system validation. Meanwhile, according to the new digital human-machine interface characteristics, the development models of human error are analyzed. (author)

  6. Meta-Analysis of Human Factors Engineering Studies Comparing Individual Differences, Practice Effects and Equipment Design Variations.

    Science.gov (United States)

    1985-02-21

    Approvoid foT public 90Ieleol, 2* . tJni7nited " - . - o . - ’--. * . -... . 1 UNCLASSIFIED S, E CURITY CLASSIFICATION OF THIS PAGE-" REPORT DOCUMENTATION...ACCESSION NO. 11. TITLE (Include Security Classification) . Veta -Analysis of Human Factors Engineering Studies Comparing Individual Differences, Practice...Background C Opportunity D Significance E History III. PHASE I FINAL REPORT A Literature Review B Formal Analysis C Results D Implications for Phase II IV

  7. Reference to the Safety Engineering Undergraduate Courses to Improve the Subjects and Contents of the Certified Safety Engineer Qualification and Examination System of China

    OpenAIRE

    Haibin Qiu; Shanghong Shi; Tingdi Zhao; Yiwei Qiao; Jiangshi Zhang

    2013-01-01

    The aim of this paper is to recommend that the subjects and contents of certified safety engineers use safety engineering undergraduate curriculum system for reference. Human resources play an important role in accident prevention and loss control. Education on safety engineering develops quickly in China. Moreover, the State Administration of Work Safety and the National Human Resources and Social Security Ministry have implemented a certified safety engineer qualification and examination sy...

  8. Human Engineering Procedures Guide

    Science.gov (United States)

    1981-09-01

    Research Laboratory AFETR Air Force Eastern Test Range AFFTC Air Force Flight Test Center AFHRL Air Force Human Resources Laboratory AFR Air Force...performance requirements through the most effective use of man’s performance capability. 13 Human Engineering is one of five elements in the Human...applied judiciously and tailored to fit * the program or program phase and the acquisition strategy to achieve cost effective acquisition and life cycle

  9. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  10. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  11. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  12. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  13. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  14. Human Flesh Search Engine and Online Privacy.

    Science.gov (United States)

    Zhang, Yang; Gao, Hong

    2016-04-01

    Human flesh search engine can be a double-edged sword, bringing convenience on the one hand and leading to infringement of personal privacy on the other hand. This paper discusses the ethical problems brought about by the human flesh search engine, as well as possible solutions.

  15. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  16. When Should We Care About Sustainability? Applying Human Security as the Decisive Criterion

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2012-05-01

    Full Text Available It seems intuitively clear that not all human endeavours warrant equal concern over the extent of their sustainability. This raises the question about what criteria might best serve for their prioritisation. We refute, on empirical and theoretical grounds, the counterclaim that sustainability should be of no concern regardless of the circumstances. Human security can serve as a source of criteria that are both widely shared and can be assessed in a reasonably objective manner. Using established classifications, we explore how four forms of sustainability (environmental, economic, social, and cultural relate to the four pillars of human security (environmental, economic, sociopolitical, and health-related. Our findings, based on probable correlations, suggest that the criteria of human security allow for a reliable discrimination between relatively trivial incidences of unsustainable behavior and those that warrant widely shared serious concern. They also confirm that certain sources of human insecurity, such as poverty or violent conflict, tend to perpetuate unsustainable behavior, a useful consideration for the design of development initiatives. Considering that human security enjoys wide and increasing political support among the international community, it is to be hoped that by publicizing the close correlation between human security and sustainability greater attention will be paid to the latter and to its careful definition.

  17. Human factor engineering applied to nuclear power plant design

    International Nuclear Information System (INIS)

    Manrique, A.; Valdivia, J.C.

    2007-01-01

    Advantages of implementing adequate Human Factor Engineering techniques in the design of nuclear reactors have become not only a fact recognized by the majority of engineers and operators but also an explicit requirement regulated and mandatory for the new designs of the so called advanced reactors. The first step for this is preparing a plan to incorporate all the Human Factor Engineering principles and developing an integral design of the Instrumentation and Control and Man-machine interface systems. Such a plan should state: -) Activities to be performed, and -) Creation of a Human Factor Engineering team adequately qualified. The Human Factor Engineering team is an integral part of the design team and is strongly linked to the engineering organizations but simultaneously has independence to act and is free to evaluate designs and propose changes in order to enhance human behavior. TECNATOM S.A. (a Spanish company) has been a part of the Design and Human Factor Engineering Team and has collaborated in the design of an advanced Nuclear Power Plant, developing methodologies and further implementing those methodologies in the design of the plant systems through the development of the plant systems operational analysis and of the man-machine interface design. The methodologies developed are made up of the following plans: -) Human Factor Engineering implementation in the Man-Machine Interface design; -) Plant System Functional Requirement Analysis; -) Allocation of Functions to man/machine; -) Task Analysis; -) Human-System Interface design; -) Control Room Verification and -) Validation

  18. Iris Cryptography for Security Purpose

    Science.gov (United States)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  19. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  20. Genetic engineering of crops: a ray of hope for enhanced food security.

    Science.gov (United States)

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  1. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  2. Human Modeling for Ground Processing Human Factors Engineering Analysis

    Science.gov (United States)

    Stambolian, Damon B.; Lawrence, Brad A.; Stelges, Katrine S.; Steady, Marie-Jeanne O.; Ridgwell, Lora C.; Mills, Robert E.; Henderson, Gena; Tran, Donald; Barth, Tim

    2011-01-01

    There have been many advancements and accomplishments over the last few years using human modeling for human factors engineering analysis for design of spacecraft. The key methods used for this are motion capture and computer generated human models. The focus of this paper is to explain the human modeling currently used at Kennedy Space Center (KSC), and to explain the future plans for human modeling for future spacecraft designs

  3. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  4. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  5. Human factors and security in the nuclear and radioactive facilities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Ilizastegui Perez, F.

    1998-01-01

    Considering the wide and multidisciplinary character the topics related with the human factors and the security one believes in the one in CNSN a group gives human factors that has carried out some works in several addresses such form that can be integrated the knowledge and experience in an unique objective to reduce the incidence the human factors in the security starting from a fundamentally preventive work. The present work picks up the main results the developed work

  6. The application of human engineering in control room of HFETR

    International Nuclear Information System (INIS)

    Yang Shuchun; Shan Songlin

    2003-01-01

    The human-machine system for improving the working environment in the control room of HFETR is described. The reliability of the equipment, instruments and operation by human engineering is increased. The relations between human engineering and lowering human failure in HFETR are also discussed. It is concluded that the further application of human engineering can increase interaction of the human and machine in the control room and provide assurances for the safe and reliable operation of reactor. (authors)

  7. The application of human engineering in control room of HFETR

    Energy Technology Data Exchange (ETDEWEB)

    Shuchun, Yang; Songlin, Shan [Nuclear Power Inst. of China, Chengdu (China)

    2003-07-01

    The human-machine system for improving the working environment in the control room of HFETR is described. The reliability of the equipment, instruments and operation by human engineering is increased. The relations between human engineering and lowering human failure in HFETR are also discussed. It is concluded that the further application of human engineering can increase interaction of the human and machine in the control room and provide assurances for the safe and reliable operation of reactor. (authors)

  8. Software Engineering for Human Spaceflight

    Science.gov (United States)

    Fredrickson, Steven E.

    2014-01-01

    The Spacecraft Software Engineering Branch of NASA Johnson Space Center (JSC) provides world-class products, leadership, and technical expertise in software engineering, processes, technology, and systems management for human spaceflight. The branch contributes to major NASA programs (e.g. ISS, MPCV/Orion) with in-house software development and prime contractor oversight, and maintains the JSC Engineering Directorate CMMI rating for flight software development. Software engineering teams work with hardware developers, mission planners, and system operators to integrate flight vehicles, habitats, robotics, and other spacecraft elements. They seek to infuse automation and autonomy into missions, and apply new technologies to flight processor and computational architectures. This presentation will provide an overview of key software-related projects, software methodologies and tools, and technology pursuits of interest to the JSC Spacecraft Software Engineering Branch.

  9. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  10. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2006-10-24

    In his talk about 'Human Security And The Quest For Peace In The Middle East' Dr. Mohamed ElBaradei, Director General of the IAEA, first looked at the international security landscape and then focused on the Middle East as a case in point. According to a recent report on human security, there has been a sharp decline since the early 1990s in civil wars and other forms of armed conflict. The number of refugees has also gone down, and human rights abuses have decreased. These statistics indicate that the world is becoming more peaceful. Yet at the same time, the collective sense of insecurity is higher than at any time before, because the forces that drive insecurity remain persistent and pervasive. These drivers of insecurity fit into four categories: poverty (poverty-related insecurities, for the billions who lack access to reliable food supplies, safe drinking water, adequate health care, and modern energy supplies), the lack of good governance, the sense of injustice (resulting from the imbalance between the 'haves' and the 'have nots' and the artificial polarization along religious or ethnic lines. The modern age demands that we think in terms of human security - a concept of security that is people centered and without borders. A concept that acknowledges the inherent linkages between economic and social development, respect for human rights, and peace. This is the basis on which we must 're-engineer' security. UN bodies have succeeded in setting norms and overseeing many important aspects of our life - such as labour relations, global health, civil aviation, food and agriculture, and trade. Despite these achievements, however the system often fails short in addressing threats to international peace and security. To understand the urgency of reforming our system for maintaining international peace and security, we must also look critically at situations where it has not been able to adequately fulfill its function. Three aspects in that regard are to be

  11. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2006-01-01

    In his talk about 'Human Security And The Quest For Peace In The Middle East' Dr. Mohamed ElBaradei, Director General of the IAEA, first looked at the international security landscape and then focused on the Middle East as a case in point. According to a recent report on human security, there has been a sharp decline since the early 1990s in civil wars and other forms of armed conflict. The number of refugees has also gone down, and human rights abuses have decreased. These statistics indicate that the world is becoming more peaceful. Yet at the same time, the collective sense of insecurity is higher than at any time before, because the forces that drive insecurity remain persistent and pervasive. These drivers of insecurity fit into four categories: poverty (poverty-related insecurities, for the billions who lack access to reliable food supplies, safe drinking water, adequate health care, and modern energy supplies), the lack of good governance, the sense of injustice (resulting from the imbalance between the 'haves' and the 'have nots' and the artificial polarization along religious or ethnic lines. The modern age demands that we think in terms of human security - a concept of security that is people centered and without borders. A concept that acknowledges the inherent linkages between economic and social development, respect for human rights, and peace. This is the basis on which we must 're-engineer' security. UN bodies have succeeded in setting norms and overseeing many important aspects of our life - such as labour relations, global health, civil aviation, food and agriculture, and trade. Despite these achievements, however the system often fails short in addressing threats to international peace and security. To understand the urgency of reforming our system for maintaining international peace and security, we must also look critically at situations where it has not been able to adequately fulfill its function. Three aspects in that regard are to be

  12. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  13. The Systems Engineering Process for Human Support Technology Development

    Science.gov (United States)

    Jones, Harry

    2005-01-01

    Systems engineering is designing and optimizing systems. This paper reviews the systems engineering process and indicates how it can be applied in the development of advanced human support systems. Systems engineering develops the performance requirements, subsystem specifications, and detailed designs needed to construct a desired system. Systems design is difficult, requiring both art and science and balancing human and technical considerations. The essential systems engineering activity is trading off and compromising between competing objectives such as performance and cost, schedule and risk. Systems engineering is not a complete independent process. It usually supports a system development project. This review emphasizes the NASA project management process as described in NASA Procedural Requirement (NPR) 7120.5B. The process is a top down phased approach that includes the most fundamental activities of systems engineering - requirements definition, systems analysis, and design. NPR 7120.5B also requires projects to perform the engineering analyses needed to ensure that the system will operate correctly with regard to reliability, safety, risk, cost, and human factors. We review the system development project process, the standard systems engineering design methodology, and some of the specialized systems analysis techniques. We will discuss how they could apply to advanced human support systems development. The purpose of advanced systems development is not directly to supply human space flight hardware, but rather to provide superior candidate systems that will be selected for implementation by future missions. The most direct application of systems engineering is in guiding the development of prototype and flight experiment hardware. However, anticipatory systems engineering of possible future flight systems would be useful in identifying the most promising development projects.

  14. Human Factors Engineering Guidelines for Overhead Cranes

    Science.gov (United States)

    Chandler, Faith; Delgado, H. (Technical Monitor)

    2001-01-01

    This guideline provides standards for overhead crane cabs that can be applied to the design and modification of crane cabs to reduce the potential for human error due to design. This guideline serves as an aid during the development of a specification for purchases of cranes or for an engineering support request for crane design modification. It aids human factors engineers in evaluating existing cranes during accident investigations or safety reviews.

  15. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  16. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  17. Introduction to human factors engineering

    International Nuclear Information System (INIS)

    Derfuss, Ch.

    2010-01-01

    Some of the main aspects of human factors engineering are discussed. The following topics are considered: Integration into the design process; Identification and application of human-centered design requirements; Design of error-tolerant systems; Iterative process consisting of evaluations and feedback loops; Participation of operators/users; Utilization of an interdisciplinary design/ evaluation team; Documentation of the complete HFE-process: traceability

  18. Peace, Human Security and Sustainable Development in Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Peace, Human Security and Sustainable Development in Africa ... into a sustainable livelihood for some of the poorest communities in Africa. ... Project status ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... titled “Climate change and adaptive water management: Innovative solutions from ...

  19. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  20. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  1. Human Engineering Modeling and Performance Lab Study Project

    Science.gov (United States)

    Oliva-Buisson, Yvette J.

    2014-01-01

    The HEMAP (Human Engineering Modeling and Performance) Lab is a joint effort between the Industrial and Human Engineering group and the KAVE (Kennedy Advanced Visualiations Environment) group. The lab consists of sixteen camera system that is used to capture human motions and operational tasks, through te use of a Velcro suit equipped with sensors, and then simulate these tasks in an ergonomic software package know as Jac, The Jack software is able to identify the potential risk hazards.

  2. The Social Engineering Personality Framework

    NARCIS (Netherlands)

    Uebelacker, Sven; Quiel, Susanne

    We explore ICT security in a socio-technical world and focus in particular on the susceptibility to social engineering attacks. We pursue the question if and how personality traits influence this susceptibility. This allows us to research human factors and their potential impact on the physical and

  3. Editorial for Journal of Human Security Volume 10

    Directory of Open Access Journals (Sweden)

    Sabina Lautensach

    2014-01-01

    Full Text Available Nelson Rolihlahla Mandela's death on 5 December 2013 and his funeral ten days later were taken as an occasion in the global media to discuss the merits of political leadership for human security, with occasional comments on its pitfalls. This particular leader is not the most politically safe object of discussion, as, for a long time, he openly advocated civil disobedience and resistance, initially of the non-violent kind, but later becoming violent. Predictably, the local hegemon reacted with great brutality and sweeping measures to the resistance of the ANC, policies that shocked many in the western world. This reaction by the gov­ernment and its supporters and the counterreaction it incited amounted, in the long run, to little more than a vast reduction in human security for most citizens of South Africa, lasting until the ANC's victory and Mr Mandela's ascendance to the presidency in 1994.

  4. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  5. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  6. Human Capital. Corps of Engineers Needs to Update Its Workforce Planning Process to More Effectively Address Its Current and Future Workforce Needs

    Science.gov (United States)

    2008-05-01

    Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia Committee on Homeland Security and...allows flex-time, telecommuting , or alternative work schedules. Page 17 GAO-08-596 Corps of Engineers Table 1: Examples of Human Capital...programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight , policy, and funding

  7. Human engineering in mobile radwaste systems

    International Nuclear Information System (INIS)

    Jones, D.; McMahon, J.; Motl, G.

    1988-01-01

    To a large degree, mobile radwaste systems are replacing installed plant systems at US nuclear plants due to regulatory obsolescence, high capital and maintenance costs, and increased radiation exposure. Well over half the power plants in the United States now use some sort of mobile system similar to those offered by LN Technologies Corporation. Human engineering is reflected in mobile radwaste system design due to concerns about safety, efficiency, and cost. The radwaste services business is so competitive that vendors must reflect human engineering in several areas of equipment design in order to compete. The paper discusses radiation exposure control, contamination control, compact components, maintainability, operation, and transportability

  8. IoT Privacy and Security Challenges for Smart Home Environments

    Directory of Open Access Journals (Sweden)

    Huichen Lin

    2016-07-01

    Full Text Available Often the Internet of Things (IoT is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

  9. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  10. Seeking perfection: a Kantian look at human genetic engineering.

    Science.gov (United States)

    Gunderson, Martin

    2007-01-01

    It is tempting to argue that Kantian moral philosophy justifies prohibiting both human germ-line genetic engineering and non-therapeutic genetic engineering because they fail to respect human dignity. There are, however, good reasons for resisting this temptation. In fact, Kant's moral philosophy provides reasons that support genetic engineering-even germ-line and non-therapeutic. This is true of Kant's imperfect duties to seek one's own perfection and the happiness of others. It is also true of the categorical imperative. Kant's moral philosophy does, however, provide limits to justifiable genetic engineering.

  11. Human Security and the Governmentality of Neo-Liberal Mobility : A Feminist Perspective

    NARCIS (Netherlands)

    T-D. Truong (Thanh-Dam)

    2006-01-01

    textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and

  12. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  13. IoT Privacy and Security Challenges for Smart Home Environments

    OpenAIRE

    Huichen Lin; Neil W. Bergmann

    2016-01-01

    Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic enviro...

  14. Vision and Displays for Military and Security Applications The Advanced Deployable Day/Night Simulation Project

    CERN Document Server

    Niall, Keith K

    2010-01-01

    Vision and Displays for Military and Security Applications presents recent advances in projection technologies and associated simulation technologies for military and security applications. Specifically, this book covers night vision simulation, semi-automated methods in photogrammetry, and the development and evaluation of high-resolution laser projection technologies for simulation. Topics covered include: advances in high-resolution projection, advances in image generation, geographic modeling, and LIDAR imaging, as well as human factors research for daylight simulation and for night vision devices. This title is ideal for optical engineers, simulator users and manufacturers, geomatics specialists, human factors researchers, and for engineers working with high-resolution display systems. It describes leading-edge methods for human factors research, and it describes the manufacture and evaluation of ultra-high resolution displays to provide unprecedented pixel density in visual simulation.

  15. An existential analysis of genetic engineering and human rights ...

    African Journals Online (AJOL)

    Genetic engineering for purposes of human enhancement poses risks that justify regulation. However, this paper argues philosophically that it is inappropriate to use human rights treaties to prohibit germ-line genetic engineering whether therapeutic or for purposes of enhancement. When also looked at existentially, the ...

  16. The Role of Divine Revelation and Religious Teachings in Human Rights System: Security and Global Peace

    Directory of Open Access Journals (Sweden)

    Mahmoud Ghayyoum Zadeh

    2009-03-01

    Full Text Available Peace and security have always been considered as one of man’s concerns. The basis of peace and security should be sought in the theoretical foundations. However, the drafters of universal human rights have struggled to attain peace and security away from religious principles. The present article intends to introduce universal human rights in the light of religious teachings and elaborate on the related religious principles. It also deals with the distinctions between the principles governing the present world with regard to human rights and religious principles to show that if religious principles are seriously followed in the international relations, they will bring about perpetual peace and security for mankind. Therefore, Religion has a unique role in peace and security.

  17. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  18. Human factor engineering applied to nuclear power plant design

    International Nuclear Information System (INIS)

    Manrique, A.; Valdivia, J.C.; Jimenez, A.

    2001-01-01

    For the design and construction of new nuclear power plants as well as for maintenance and operation of the existing ones new man-machine interface designs and modifications are been produced. For these new designs Human Factor Engineering must be applied the same as for any other traditional engineering discipline. Advantages of implementing adequate Human Factor Engineering techniques in the design of nuclear reactors have become not only a fact recognized by the majority of engineers and operators but also an explicit requirement regulated and mandatory for the new designs of the so called advanced reactors. Additionally, the big saving achieved by a nuclear power plant having an operating methodology which significantly decreases the risk of operating errors makes it necessary and almost vital its implementation. The first step for this is preparing a plan to incorporate all the Human Factor Engineering principles and developing an integral design of the Instrumentation and Control and Man-machine interface systems. (author)

  19. "Human Nature": Chemical Engineering Students' Ideas about Human Relationships with the Natural World

    Science.gov (United States)

    Goldman, Daphne; Assaraf, Orit Ben-Zvi; Shemesh, Julia

    2014-01-01

    While importance of environmental ethics, as a component of sustainable development, in preparing engineers is widely acknowledged, little research has addressed chemical engineers' environmental concerns. This study aimed to address this void by exploring chemical engineering students' values regarding human-nature relationships. The study was…

  20. `Human nature': Chemical engineering students' ideas about human relationships with the natural world

    Science.gov (United States)

    Goldman, Daphne; Ben-Zvi Assaraf, Orit; Shemesh, Julia

    2014-05-01

    While importance of environmental ethics, as a component of sustainable development, in preparing engineers is widely acknowledged, little research has addressed chemical engineers' environmental concerns. This study aimed to address this void by exploring chemical engineering students' values regarding human-nature relationships. The study was conducted with 247 3rd-4th year chemical engineering students in Israeli Universities. It employed the New Ecological Paradigm (NEP)-questionnaire to which students added written explanations. Quantitative analysis of NEP-scale results shows that the students demonstrated moderately ecocentric orientation. Explanations to the NEP-items reveal diverse, ambivalent ideas regarding the notions embodied in the NEP, strong scientific orientation and reliance on technology for addressing environmental challenges. Endorsing sustainability implies that today's engineers be equipped with an ecological perspective. The capacity of Higher Education to enable engineers to develop dispositions about human-nature interrelationships requires adaptation of curricula towards multidisciplinary, integrative learning addressing social-political-economic-ethical perspectives, and implementing critical-thinking within the socio-scientific issues pedagogical approach.

  1. impact of boko haram insurgency on human security in nigeria

    African Journals Online (AJOL)

    abduction and killing of people; destruction of houses, schools, health care centres, churches, mosques and farms has ... KEYWORDS: Boko Haram, Insurgency, Human Security, Violence, Nigeria ..... Provide the citizens with adequate ...

  2. Institute of Industrial Engineers Asian Conference 2013

    CERN Document Server

    Tsao, Yu-Chung; Lin, Shi-Woei

    2013-01-01

    This book is based on the research papers presented during The Institute of Industrial Engineers Asian Conference 2013 held at Taipei in July 2013. It presents information on the most recent and relevant research, theories and practices in industrial and systems engineering. Key topics include: Engineering and Technology Management Engineering Economy and Cost Analysis Engineering Education and Training Facilities Planning and Management Global Manufacturing and Management Human Factors Industrial & Systems Engineering Education Information Processing and Engineering Intelligent Systems Manufacturing Systems Operations Research Production Planning and Control Project Management Quality Control and Management Reliability and Maintenance Engineering Safety, Security and Risk Management Supply Chain Management Systems Modeling and Simulation Large scale complex systems.

  3. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  4. Genome engineering in human cells.

    Science.gov (United States)

    Song, Minjung; Kim, Young-Hoon; Kim, Jin-Soo; Kim, Hyongbum

    2014-01-01

    Genome editing in human cells is of great value in research, medicine, and biotechnology. Programmable nucleases including zinc-finger nucleases, transcription activator-like effector nucleases, and RNA-guided engineered nucleases recognize a specific target sequence and make a double-strand break at that site, which can result in gene disruption, gene insertion, gene correction, or chromosomal rearrangements. The target sequence complexities of these programmable nucleases are higher than 3.2 mega base pairs, the size of the haploid human genome. Here, we briefly introduce the structure of the human genome and the characteristics of each programmable nuclease, and review their applications in human cells including pluripotent stem cells. In addition, we discuss various delivery methods for nucleases, programmable nickases, and enrichment of gene-edited human cells, all of which facilitate efficient and precise genome editing in human cells.

  5. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    OpenAIRE

    Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan

    2011-01-01

    Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...

  6. An adaptive algorithm for performance assessment of construction project management with respect to resilience engineering and job security

    Directory of Open Access Journals (Sweden)

    P. Hashemi

    2018-01-01

    Full Text Available Construction sites are accident-prone locations and therefore safety management plays an im-portant role in these workplaces. This study presents an adaptive algorithm for performance as-sessment of project management with respect to resilience engineering and job security in a large construction site. The required data are collected using questionnaires in a large construction site. The presented algorithm is composed of radial basis function (RBF, artificial neural networks multi-layer perceptron (ANN-MLP, and statistical tests. The results indicate that preparedness, fault-tolerance, and flexibility are the most effective factors on overall efficiency. Moreover, job security and resilience engineering have similar statistical impacts on overall system efficiency. The results are verified and validated by the proposed algorithm.

  7. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

    NARCIS (Netherlands)

    Massacci, F.; Prest, M.; Zannone, N.

    2005-01-01

    Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level

  8. Human engineering design in medical x-ray system

    International Nuclear Information System (INIS)

    Mori, Sadayoshi

    1981-01-01

    The dimension of control desk, design of controller and indicator are studied in relation with human body dimension of radiological technologist. First, in the design of apparatus, it is reasonable to adopt the cumulative distribution in stead of mean values of human body dimension because the mean values would be cause of inadequacy to the majority of operator. Second, I reported about the fundamental items e.g. the display of controller and indicator recommended from the point of view of human engineering. Up to now the radiological technologists were intended to take a serious view of performance of X-ray apparatus only, but hereafter, we think, it is also important to induce the thought of human engineering in the design of X-ray apparatus. (J.P.N.)

  9. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  10. Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation

    Directory of Open Access Journals (Sweden)

    Prezelj Iztok

    2015-12-01

    Full Text Available Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation (case of introducing body scanners. The paper’s results show that the concept of human security usefully integrates the care for human rights and security of individuals. The debate on the potential introduction of body scanners on the European airports was actually a debate on the ways of providing individual human security on the airports with simultaneous concern for other human rights. The output of this debate was a compromise: body scanners can be used at the discretion of individual airports and member states, but are not an obligatory measure on all European airports.

  11. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  12. Human factors evaluation of the engineering test reactor control room

    International Nuclear Information System (INIS)

    Banks, W.W.; Boone, M.P.

    1981-03-01

    The Reactor and Process Control Rooms at the Engineering Test Reactor were evaluated by a team of human factors engineers using available human factors design criteria. During the evaluation, ETR, equipment and facilities were compared with MIL-STD-1472-B, Human Engineering design Criteria for Military Systems. The focus of recommendations centered on: (a) displays and controls; placing displays and controls in functional groups; (b) establishing a consistent color coding (in compliance with a standard if possible); (c) systematizing annunciator alarms and reducing their number; (d) organizing equipment in functional groups; and (e) modifying labeling and lines of demarcation

  13. Impact of Boko Haram insurgency on human security in Nigeria ...

    African Journals Online (AJOL)

    Impact of Boko Haram insurgency on human security in Nigeria. ... Global Journal of Social Sciences ... denied millions of children and youths access to education; increased the number of internally displaced persons with dire need of shelter ...

  14. 40 CFR 91.1008 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  15. Security and trust: taking care of the human factor

    NARCIS (Netherlands)

    Egger, F.N.; Abrazhevich, D.

    2001-01-01

    In the e-business chain, the last link that needs to be convinced of the security of an online transaction is the end-user. That is why this article puts forward a user-centred perspective of the problem of trust in online payments, derived from the discipline of Human-Computer Interaction (HCI). We

  16. Secure Business Process Engineering: a socio-technical approach

    OpenAIRE

    Salnitri, Mattia

    2016-01-01

    Dealing with security is a central activity for todays organizations. Security breaches impact on the activities executed in organizations, preventing them to execute their business processes and, therefore, causing millions of dollars of losses. Security by design principles underline the importance of considering security as early as during the design of organizations to avoid expensive fixes during later phases of their lifecycle. However, the design of secure business processes cannot tak...

  17. Doing Justice to Human Security: A Textbook in Tune with its Time

    Directory of Open Access Journals (Sweden)

    Deane Edward Neubauer

    2013-01-01

    Full Text Available I begin this brief review of this important volume with the confession that I have not personally pursued a teaching style that has employed a self-acclaimed textbook for many, many years, preferring to construct courses around monographs, articles and other visual materials. However, were I provided the opportunity to teach a course at the upper division undergraduate level or early gradate level in the subject of human security, this would certainly be the book I would choose (with the caveat introduced below. Alex and Sabina Lautensach have given careful and thoughtful consideration to every aspect of the text: the preface and introduction, written by the editors, lay out both the logic of the text and frame the subject matter that will locate the reader firmly in the midst of the vast challenges that consti­tute the issue of human security. They do so by em­phasizing both the multiple dimensions along which the issue of human security can be located and the inseparable nature of these as they interact with each other in complex ways. In many respects this strikes me as one of the most important contributions to the text—its steady insistence that human security as a construct is in a discursive state of constant emer­gence, such that in some important ways all its varied dimensions insistently co-vary. To make such a claim is in itself daunting—to demonstrate its validity and mutual engagements through the complex subject matters of its 20 chapters, is a tour de force. Their conclusion is sufficiently rich to stand alone as an illustrative text in other course materials.

  18. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  19. CCNA Security Study Guide, Exam 640-553

    CERN Document Server

    Boyles, Tim

    2010-01-01

    A complete study guide for the new CCNA Security certification exam. In keeping with its status as the leading publisher of CCNA study guides, Sybex introduces the complete guide to the new CCNA security exam. The CCNA Security certification is the first step towards Cisco's new Cisco Certified Security Professional (CCSP) and Cisco Certified Internetworking Engineer-Security. With a foreword by CCNA networking authority Todd Lammle, CCNA Security Study Guide fully covers every exam objective. The companion CD includes the Sybex Test Engine, flashcards, and a PDF of the book.: The CCNA Securit

  20. The secure reactors

    International Nuclear Information System (INIS)

    Hannerz, K.

    1987-01-01

    The principle of Process Inherent Ultimate Safety (PIUS) is a new approach to Light Water Reactor (LWR) safety that could represent a solution to the present problems of public distrust, regulatory maze and plant design complexity plaguing the nuclear industry in many countries. A unique thermohydraulic design of the primary system ensures core integrity, and thereby gurarantees freedom from significant releases of radioactive matter, in all credible emergencies. This is accomplished entirely without reliance on potentially failure prone engineered safety systems and with immunity to operator mistskes. The potential for human fallibility to cause accidents is thereby drastically reduced in an easily understood way. Plant design can be greatly simplified because redundant, diverse safety systems are no longer needed. The paper briefly describes the PIUS design principle and the two SECURE reactor designs based on it, i.e. SECURE-H for district heating and process steam and SECURE-P (usually known simply as PIUS) for electric power generation. Demonstration of simulated system over-all thermohydraulic function and transient response in a large electrically heated test loop is described and results from some component development work is given. (author)

  1. Cooperative and human aspects of software engineering: CHASE 2010

    DEFF Research Database (Denmark)

    Dittrich, Yvonne; Sharp, Helen C.; Winschiers Theophilus, Heike

    2010-01-01

    Software is created by people -- software engineers in cooperation with domain experts, users and other stakeholders--in varied environments, under various conditions. Thus understanding cooperative and human aspects of software development is crucial to comprehend how and which methods and tools...... are required, to improve the creation and maintenance of software. The 3rd workshop on Cooperative and Human Aspects of Software Engineering held at the International Conference on Software Engineering continued the tradition from earlier workshops and provided a lively forum to discuss current developments...... and high quality research in the field. Further dissemination of research results will lead to an improvement of software development and deployment across the globe....

  2. Human Security versus Human Development - Behavioristic Approach

    Directory of Open Access Journals (Sweden)

    Duralia Oana

    2016-08-01

    Full Text Available Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security or the security of personal data when accessing and using the Internet (cyber security. Consequently, this paper attempts to highlight the way in which the safety and security needs of the contemporary consumer have diversified over time, often becoming determinants of social behavior in general, and of the buying and consumption behavior, in particular.

  3. Research on the NPP human factors engineering operating experience review

    International Nuclear Information System (INIS)

    Ren Xiangchen; Miao Hongxing; Ning Zhonghe

    2006-01-01

    This paper addresses the importance of the human factors engineering (HFE) for the design of nuclear power plant (NPP), especially for the design of human-machine interface in the NPP. It also summarizes the scope and content of the NPP HFE. The function, scope, content and process of the NPP human factors engineering operating experience review (OER) are mainly focused on, and significantly discussed. Finally, it briefly introduces the situation of the studies on the OER in China. (authors)

  4. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  5. Human performance models for computer-aided engineering

    Science.gov (United States)

    Elkind, Jerome I. (Editor); Card, Stuart K. (Editor); Hochberg, Julian (Editor); Huey, Beverly Messick (Editor)

    1989-01-01

    This report discusses a topic important to the field of computational human factors: models of human performance and their use in computer-based engineering facilities for the design of complex systems. It focuses on a particular human factors design problem -- the design of cockpit systems for advanced helicopters -- and on a particular aspect of human performance -- vision and related cognitive functions. By focusing in this way, the authors were able to address the selected topics in some depth and develop findings and recommendations that they believe have application to many other aspects of human performance and to other design domains.

  6. Human (in)security at the livestock-crop-wildlife nexus

    DEFF Research Database (Denmark)

    Bond, Jennifer Lauren

    Conflicts in relation to natural resources occur throughout the world in a range of contexts, both rural and urban, and across a spectrum of non-violent conflict of interest to violence. These conflicts may be between specific user groups such as agriculturalists and pastoralists or humans...... including agro-pastoral conflicts, cattle rustling and human-wildlife conflicts. The five articles of the thesis address the research questions through a human security lens drawing on quantitative and qualitative data. Analysis showed that there were several factors related to insecurity, weak governance......, natural resource management and cultural practices which cut across each of the gropastoral, cattle rustling and human-wildlife conflicts focussed on in this study. Further analysis built on these cross-cutting issues to identify the hidden impacts of these interrelated forms of insecurity on people which...

  7. An Integrated Neuroscience and Engineering Approach to Classifying Human Brain-States

    Science.gov (United States)

    2015-12-22

    AFRL-AFOSR-VA-TR-2016-0037 An Integrated Neuroscience and Engineering Approach to Classifying Human Brain-States Adrian Lee UNIVERSITY OF WASHINGTON...to 14-09-2015 4. TITLE AND SUBTITLE An Integrated Neuroscience and Engineering Approach to Classifying Human Brain- States 5a.  CONTRACT NUMBER 5b...specific cognitive states remains elusive, owing perhaps to limited crosstalk between the fields of neuroscience and engineering. Here, we report a

  8. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  9. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  10. Human Genetic Engineering: A Survey of Student Value Stances

    Science.gov (United States)

    Wilson, Sara McCormack; And Others

    1975-01-01

    Assesses the values of high school and college students relative to human genetic engineering and recommends that biology educators explore instructional strategies merging human genetic information with value clarification techniques. (LS)

  11. 130 FEMINISM AND HUMAN GENETIC ENGINEERING: A ...

    African Journals Online (AJOL)

    Ike Odimegwu

    genetic engineering to reconstruct the life of the human person. Negatively .... height, beauty or intelligence. Apart from ... cloning and stem-cell researches, artificial insemination. ..... form of manufacturing children involving their quality control.

  12. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  13. Human security and access to water, sanitation, and hygiene: exploring the drivers and nexus

    NARCIS (Netherlands)

    Obani, P.; Gupta, J.; Pahl-Wostl, C.; Badhuri, A.; Gupta, J.

    2016-01-01

    Water security challenges are mostly covered in the literature on the food and energy nexus. This chapter however adopts a broader conception of water security in relation to lack of access to water, sanitation, and hygiene (WASH), and argues that the human rights approach could be instrumental in

  14. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  15. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  16. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  17. World Congress on Medical Physics and Biomedical Engineering

    CERN Document Server

    2015-01-01

    This book presents the proceedings of the IUPESM World Biomedical Engineering and Medical Physics, a tri-annual high-level policy meeting dedicated exclusively to furthering the role of biomedical engineering and medical physics in medicine. The book offers papers about emerging issues related to the development and sustainability of the role and impact of medical physicists and biomedical engineers in medicine and healthcare. It provides a unique and important forum to secure a coordinated, multileveled global response to the need, demand, and importance of creating and supporting strong academic and clinical teams of biomedical engineers and medical physicists for the benefit of human health.

  18. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  19. Human Factors Engineering Aspects of Modifications in Control Room Modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hugo, Jacques [Idaho National Lab. (INL), Idaho Falls, ID (United States); Clefton, Gordon [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-06-01

    This report describes the basic aspects of control room modernization projects in the U.S. nuclear industry and the need for supplementary guidance on the integration of human factors considerations into the licensing and regulatory aspects of digital upgrades. The report pays specific attention to the integration of principles described in NUREG-0711 (Human Factors Engineering Program Review Model) and how supplementary guidance can help to raise general awareness in the industry regarding the complexities of control room modernization projects created by many interdependent regulations, standards and guidelines. The report also describes how human factors engineering principles and methods provided by various resources and international standards can help in navigating through the process of licensing digital upgrades. In particular, the integration of human factors engineering guidance and requirements into the process of licensing digital upgrades can help reduce uncertainty related to development of technical bases for digital upgrades that will avoid the introduction of new failure modes.

  20. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  1. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  2. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  3. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  4. Soil, Food Security and Human Health

    Science.gov (United States)

    Oliver, Margaret

    2017-04-01

    "Upon this handful of soil our survival depends. Husband it and it will grow food, our fuel, and our shelter and surround us with beauty. Abuse it and the soil will collapse and die, taking humanity with it" Vedas Sanskrit Scripture, 1500 BC. As the world's population increases issues of food security become more pressing as does the need to sustain soil fertility and to minimize soil degradation. Soil and land are finite resources, and agricultural land is under severe competition from many other uses. Lack of adequate food and food of poor nutritional quality lead to under-nutrition of different degrees, all of which can cause ill- or suboptimal-health. The soil can affect human health directly and indirectly. Direct effects of soil or its constituents result from its ingestion, inhalation or absorption. For example, hook worms enter the body through the skin and cause anaemia, and fungi and dust can be inhaled resulting in respiratory problems. The soil is the source of actinomycetes on which our earliest antibiotics are based (actinomycin, neomycin and streptomycin). Furthermore, it is a potential reservoir of new antibiotics with methods such as functional metagenomics to identify antibiotic resistant genes. Indirect effects of soil arise from the quantity and quality of food that humans consume. Trace elements can have both beneficial and toxic effects on humans, especially where the range for optimal intake is narrow as for selenium. Deficiencies of four trace elements, iodine, iron, selenium and zinc, will be considered because of their substantial effects on human health. Relations between soil and human health are often difficult to extricate because of the many confounding factors present such as the source of food, social factors and so on. Nevertheless, recent scientific understanding of soil processes and factors that affect human health are enabling greater insight into the effects of soil on our health. Multidisciplinary research that includes soil

  5. The Unreasonable Ineffectiveness of Security Engineering: An Overview

    NARCIS (Netherlands)

    Pavlovic, Dusko

    2010-01-01

    In his 1960 essay, Eugene Wigner raised the question of ‿the unreasonable effectiveness of mathematics in natural sciences‿. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security

  6. Control room design and human engineering in power plants

    International Nuclear Information System (INIS)

    Herbst, L.; Hinz, W.

    1982-01-01

    The concept for modern plant control rooms is primary influenced by: The automation of protection, binary control and closed loop control functions; organization employing functional areas; computer based information processing; human engineered design. Automation reduces the human work load. Employment of functional areas permits optimization of operational sequences. Computer based information processing makes it possible to output information in accordance with operating requirements. Design based on human engineering principles assures the quality of the interaction between the operator and the equipment. The degree to which these conceptional features play a role in design of power plant control rooms depends on the unit rating, the mode of operation and on the requirements respecting safety and availability of the plant. (orig.)

  7. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  8. reCAPTCHA: human-based character recognition via Web security measures.

    Science.gov (United States)

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  9. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...

  10. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  11. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  12. Computer aided systems human engineering: A hypermedia tool

    Science.gov (United States)

    Boff, Kenneth R.; Monk, Donald L.; Cody, William J.

    1992-01-01

    The Computer Aided Systems Human Engineering (CASHE) system, Version 1.0, is a multimedia ergonomics database on CD-ROM for the Apple Macintosh II computer, being developed for use by human system designers, educators, and researchers. It will initially be available on CD-ROM and will allow users to access ergonomics data and models stored electronically as text, graphics, and audio. The CASHE CD-ROM, Version 1.0 will contain the Boff and Lincoln (1988) Engineering Data Compendium, MIL-STD-1472D and a unique, interactive simulation capability, the Perception and Performance Prototyper. Its features also include a specialized data retrieval, scaling, and analysis capability and the state of the art in information retrieval, browsing, and navigation.

  13. Cyber-Informed Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Benjamin, Jacob [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinones, Luis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Paz, Jonathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-03-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  14. Cyber-Informed Engineering

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.; Quinones, Luis; Paz, Jonathan

    2017-01-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  15. Buried waste integrated demonstration human engineered control station. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This document describes the Human Engineered Control Station (HECS) project activities including the conceptual designs. The purpose of the HECS is to enhance the effectiveness and efficiency of remote retrieval by providing an integrated remote control station. The HECS integrates human capabilities, limitations, and expectations into the design to reduce the potential for human error, provides an easy system to learn and operate, provides an increased productivity, and reduces the ultimate investment in training. The overall HECS consists of the technology interface stations, supporting engineering aids, platform (trailer), communications network (broadband system), and collision avoidance system.

  16. Buried waste integrated demonstration human engineered control station. Final report

    International Nuclear Information System (INIS)

    1994-09-01

    This document describes the Human Engineered Control Station (HECS) project activities including the conceptual designs. The purpose of the HECS is to enhance the effectiveness and efficiency of remote retrieval by providing an integrated remote control station. The HECS integrates human capabilities, limitations, and expectations into the design to reduce the potential for human error, provides an easy system to learn and operate, provides an increased productivity, and reduces the ultimate investment in training. The overall HECS consists of the technology interface stations, supporting engineering aids, platform (trailer), communications network (broadband system), and collision avoidance system

  17. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  18. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  19. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  20. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  1. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  2. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  3. A Security Approach in System Development Life Cycle

    OpenAIRE

    P.Mahizharuvi; Dr.Alagarsamy

    2011-01-01

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today have a wide reach, security has become a more important factor than ever in the history of software engineering can no longer be treated as Separ...

  4. Human engineering considerations in the design of New Virginia Power Radwaste facilities

    International Nuclear Information System (INIS)

    Bankley, A.V.; Morris, L.L.; Lippard, D.W.

    1988-01-01

    Human engineering principles were considered by Virginia Power in the recent design of new radwaste facilities (NRFs) for both the Surry and North Anna power stations. Virginia Power recognized that the rigorous application of human engineering principles to the NRF design was essential to the ultimate success or failure of the facilities. Success of the NRF should not only be measured in the volume of radwaste processed but also by other factors such as (a) availability and maintainability of preferred equipment, (b) as-low-as-reasonably-achievable considerations, (c) actual release rates versus achievable release rates, and (d) flexibility to deal with varying circumstances. Each of these success criteria would suffer as the result of operator/human inefficiencies or error. Therefore, human engineering should be applied to the maximum practical extent to minimize such inefficiencies or errors. No method is ever going to ensure a perfectly human-engineered facility design. Virginia Power believes, however, that significant strides have been made in efforts to design and construct a successful radwaste processing facility, a facility where operating success rests with the ability of the human operators to perform their jobs in an efficient and reliable fashion

  5. Development of human factors engineering guide for nuclear power project

    International Nuclear Information System (INIS)

    Wu Dangshi; Sheng Jufang

    1997-01-01

    'THE PRACTICAL GUIDE FOR APPLICATION OF HUMAN FACTORS ENGINEERING TO NUCLEAR POWER PROJECT (First Draft, in Chinese)', which was developed under a research program sponsored by National Nuclear Safety Administration (NNSA) is described briefly. It is hoped that more conscious, more systematical and more comprehensive application of Human Factors Engineering to the nuclear power projects from the preliminary feasibility studies up to the commercial operation will benefit the safe, efficient and economical operations of nuclear power plants in China

  6. An overview of NASA ISS human engineering and habitability: past, present, and future.

    Science.gov (United States)

    Fitts, D; Architecture, B

    2000-09-01

    The International Space Station (ISS) is the first major NASA project to provide human engineering an equal system engineering an equal system engineering status to other disciplines. The incorporation and verification of hundreds of human engineering requirements applied across-the-board to the ISS has provided for a notably more habitable environment to support long duration spaceflight missions than might otherwise have been the case. As the ISS begins to be inhabited and become operational, much work remains in monitoring the effectiveness of the Station's built environment in supporting the range of activities required of a long-duration vehicle. With international partner participation, NASA's ISS Operational Habitability Assessment intends to carry human engineering and habitability considerations into the next phase of the ISS Program with constant attention to opportunities for cost-effective improvements that need to be and can be made to the on-orbit facility. Too, during its operations the ISS must be effectively used as an on-orbit laboratory to promote and expand human engineering/habitability awareness and knowledge to support the international space faring community with the data needed to develop future space vehicles for long-duration missions. As future space mission duration increases, the rise in importance of habitation issues make it imperative that lessons are captured from the experience of human engineering's incorporation into the ISS Program and applied to future NASA programmatic processes.

  7. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  8. Human Security in the Asia-Pacific: In Australia’s National Interests?

    Science.gov (United States)

    2011-12-16

    opportunities for the disadvantaged. Further, overfishing and intense competition reduces legitimate income for traditional seafaring communities and...international community through the rule of law. In the second way, the purpose of human security is essentially humanitarian. Viewed through this prism, human...terrorism and Sudden Acute Respiratory Syndrome generated fear within the community —one through fear of violence and the other fear of illness

  9. Enhancing the Human Factors Engineering Role in an Austere Fiscal Environment

    Science.gov (United States)

    Stokes, Jack W.

    2003-01-01

    An austere fiscal environment in the aerospace community creates pressures to reduce program costs, often minimizing or sometimes even deleting the human interface requirements from the design process. With an assumption that the flight crew can recover real time from a poorly human factored space vehicle design, the classical crew interface requirements have been either not included in the design or not properly funded, though carried as requirements. Cost cuts have also affected quality of retained human factors engineering personnel. In response to this concern, planning is ongoing to correct the acting issues. Herein are techniques for ensuring that human interface requirements are integrated into a flight design, from proposal through verification and launch activation. This includes human factors requirements refinement and consolidation across flight programs; keyword phrases in the proposals; closer ties with systems engineering and other classical disciplines; early planning for crew-interface verification; and an Agency integrated human factors verification program, under the One NASA theme. Importance is given to communication within the aerospace human factors discipline, and utilizing the strengths of all government, industry, and academic human factors organizations in an unified research and engineering approach. A list of recommendations and concerns are provided in closing.

  10. Human factors and systems engineering approach to patient safety for radiotherapy.

    Science.gov (United States)

    Rivera, A Joy; Karsh, Ben-Tzion

    2008-01-01

    The traditional approach to solving patient safety problems in healthcare is to blame the last person to touch the patient. But since the publication of To Err is Human, the call has been instead to use human factors and systems engineering methods and principles to solve patient safety problems. However, an understanding of the human factors and systems engineering is lacking, and confusion remains about what it means to apply their principles. This paper provides a primer on them and their applications to patient safety.

  11. Human Factors and Systems Engineering Approach to Patient Safety for Radiotherapy

    International Nuclear Information System (INIS)

    Rivera, A. Joy; Karsh, Ben-Tzion

    2008-01-01

    The traditional approach to solving patient safety problems in healthcare is to blame the last person to touch the patient. But since the publication of To Err is Human, the call has been instead to use human factors and systems engineering methods and principles to solve patient safety problems. However, an understanding of the human factors and systems engineering is lacking, and confusion remains about what it means to apply their principles. This paper provides a primer on them and their applications to patient safety

  12. A Secure Alignment Algorithm for Mapping Short Reads to Human Genome.

    Science.gov (United States)

    Zhao, Yongan; Wang, Xiaofeng; Tang, Haixu

    2018-05-09

    The elastic and inexpensive computing resources such as clouds have been recognized as a useful solution to analyzing massive human genomic data (e.g., acquired by using next-generation sequencers) in biomedical researches. However, outsourcing human genome computation to public or commercial clouds was hindered due to privacy concerns: even a small number of human genome sequences contain sufficient information for identifying the donor of the genomic data. This issue cannot be directly addressed by existing security and cryptographic techniques (such as homomorphic encryption), because they are too heavyweight to carry out practical genome computation tasks on massive data. In this article, we present a secure algorithm to accomplish the read mapping, one of the most basic tasks in human genomic data analysis based on a hybrid cloud computing model. Comparing with the existing approaches, our algorithm delegates most computation to the public cloud, while only performing encryption and decryption on the private cloud, and thus makes the maximum use of the computing resource of the public cloud. Furthermore, our algorithm reports similar results as the nonsecure read mapping algorithms, including the alignment between reads and the reference genome, which can be directly used in the downstream analysis such as the inference of genomic variations. We implemented the algorithm in C++ and Python on a hybrid cloud system, in which the public cloud uses an Apache Spark system.

  13. Security Requirements – Analysis of the Issue

    Directory of Open Access Journals (Sweden)

    Jhon Vincent

    2013-12-01

    Full Text Available Needs about security are matters little taken into account when managing requirements engineering , and when considered in the life cycle of the system , they tend to become a general list of functions, as password of protection , firewalls , virus detection tools , and other similar. But in fact, they cannot be considered as requirements of security, because they are implementation mechanisms to try to meet unspecified requirements, as an authenticated access. As a result, the security requirements for the system are ignored, which are required to protect essential services and assets, besides, when are specified, is not considered the prospect of future attacks. This paper describes the need for a systematic approach to managing security requirements engineering, in order to help avoid the problem of generic lists and take into account the future perspective. Several related approaches are described and also are provided references additional material that can help requirements engineers to ensure that their products be taken into account, effectively , the security requirements.

  14. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  15. Human factors engineering in the design of colour-graphic displays

    International Nuclear Information System (INIS)

    Fenton, E.F.

    1985-01-01

    The operator interface for Ontario Hydro's Darlington Nuclear Generating Station will rely extensively on the use of coloured graphic display formats. These are used for the presentation of both control and monitoring information. The displays are organized in a hierarchical relationship and a simple interactive selection method using light pens has been implemented. The application of human factors engineering principles has been a major factor in all aspects of the design. This paper describes the system and the human factors engineering function

  16. The European Union’s Human Security Doctrine: A Critical Analysis

    Science.gov (United States)

    2009-03-01

    Symbolism: Europe Takes on Human Security,” 92. 91 Ayn Rand, The Virtue of Selfishness: A New Concept of Egoism (New York: Signet Press, 1964). 92 Bailes...New Concept of Egoism . New York: Signet Press, 1964. Report of the International Commission on Intervention and State Sovereignty. The Responsibility

  17. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  18. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  19. Computer-aided support for Secure Tropos

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.

    2007-01-01

    In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an

  20. Information and Knowledge Management in the Scope of the Information Security practices: the human factor within Organizations

    Directory of Open Access Journals (Sweden)

    Luciana Emirena Santos Carneiro

    2013-08-01

    Full Text Available The security of informational assets has always been a corporate requirement. These assets can be scaled in three main spheres, namely, people, organizational processes and technologies. The internet, the web, the broadcast of networks, and the growing presence of technology both in people's lives and in organizational contexts have caused profound transformations in the intrinsic processes that constitute personal and organizational routines. On the one hand, these changes provided by the technological progress have fostered competitiveness and decentralization; on the other hand, they require better management, control, security and protection for information and knowledge. This article presents the results of an investigation within information security realm, focusing on the human aspects of knowledge and information management related to security practices. Using a quality-quantitative approach, we identify behavioral actions and profiles of employees of a company in the field of healthcare, which reveal some connections with information security failures. We conclude that the human element is a relevant variable, even a critical one, for the management of information security in organizations.

  1. Design Thinkers Can Save the World: How Understanding Their Interests, Goals, and Motivation Can Inform Engineering Educators

    Science.gov (United States)

    Blizzard, Jacqualyn

    2013-01-01

    The need for more engineers equipped with new skill sets is essential for ensuring our national security, climate sustainability, and maintaining our position as a global leader in innovation and as an economic world power. The design challenges engineers face increasingly require a human-centered, creative, practical, and systems-based approach…

  2. Argumentation-Based Security Requirements Elicitation: The Next Round

    NARCIS (Netherlands)

    Ionita, Dan; Bullee, Jan-Willem; Wieringa, Roelf J.

    2014-01-01

    Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of

  3. Human factors engineering evaluation of the UTR-10 Reactor

    International Nuclear Information System (INIS)

    Lahti, D.; Nilius, D.; Heithoff, D.; Roche, G.; Sage, S.

    1982-01-01

    This paper is a description of a student design team's review and evaluation of Iowa State University's University Test Reactor (UTR-10). The review was based on how well the control room of the UTR-10 measured up to selected portions of NUREG-0800, chapter 18, Human Factor Engineering/Standard Review Plan Development. The review was conducted by inspecting the reactor and interviewing reactor operators. The control room workspace, instrumentation controls and other equipment were evaluated from a human factors engineering point of view that takes into account both system demands and operator capabilities. Identification, assessment, and suggestion for control room design modifications that correct inadequate or unsuitable items was made

  4. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  5. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  6. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  7. Using Proven Reference Monitor Patterns for Security Evaluation

    Directory of Open Access Journals (Sweden)

    Mark R. Heckman

    2016-04-01

    Full Text Available The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC. This paper explains how the TCSEC and its Trusted Network Interpretation (TNI constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed.

  8. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  9. The Potential of Human Rights Education for Conflict Prevention and Security

    Science.gov (United States)

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  10. Cognitive engineering in the design of human-computer interaction and expert systems

    International Nuclear Information System (INIS)

    Salvendy, G.

    1987-01-01

    The 68 papers contributing to this book cover the following areas: Theories of Interface Design; Methodologies of Interface Design; Applications of Interface Design; Software Design; Human Factors in Speech Technology and Telecommunications; Design of Graphic Dialogues; Knowledge Acquisition for Knowledge-Based Systems; Design, Evaluation and Use of Expert Systems. This demonstrates the dual role of cognitive engineering. On the one hand cognitive engineering is utilized to design computing systems which are compatible with human cognition and can be effectively and be easily utilized by all individuals. On the other hand, cognitive engineering is utilized to transfer human cognition into the computer for the purpose of building expert systems. Two papers are of interest to INIS

  11. Book Review: Anja Jetschke: Human Rights and State Security: Indonesia and the Philippines

    Directory of Open Access Journals (Sweden)

    Salvador Santino F. Regilme, Jr.

    2013-01-01

    Full Text Available Book Review of the Monograph: Jetschke, Anja (2010, Human Rights and State Security: Indonesia and the Philippines ; Philadelphia: University of Pennsylvania Press, ISBN: 978-0-8122-4301-7, 368 pages

  12. Patient safety - the role of human factors and systems engineering.

    Science.gov (United States)

    Carayon, Pascale; Wood, Kenneth E

    2010-01-01

    Patient safety is a global challenge that requires knowledge and skills in multiple areas, including human factors and systems engineering. In this chapter, numerous conceptual approaches and methods for analyzing, preventing and mitigating medical errors are described. Given the complexity of healthcare work systems and processes, we emphasize the need for increasing partnerships between the health sciences and human factors and systems engineering to improve patient safety. Those partnerships will be able to develop and implement the system redesigns that are necessary to improve healthcare work systems and processes for patient safety.

  13. Patient Safety: The Role of Human Factors and Systems Engineering

    Science.gov (United States)

    Carayon, Pascale; Wood, Kenneth E.

    2011-01-01

    Patient safety is a global challenge that requires knowledge and skills in multiple areas, including human factors and systems engineering. In this chapter, numerous conceptual approaches and methods for analyzing, preventing and mitigating medical errors are described. Given the complexity of healthcare work systems and processes, we emphasize the need for increasing partnerships between the health sciences and human factors and systems engineering to improve patient safety. Those partnerships will be able to develop and implement the system redesigns that are necessary to improve healthcare work systems and processes for patient safety. PMID:20543237

  14. Using human factors engineering to improve the effectiveness of infection prevention and control.

    Science.gov (United States)

    Anderson, Judith; Gosbee, Laura Lin; Bessesen, Mary; Williams, Linda

    2010-08-01

    Human factors engineering is a discipline that studies the capabilities and limitations of humans and the design of devices and systems for improved performance. The principles of human factors engineering can be applied to infection prevention and control to study the interaction between the healthcare worker and the system that he or she is working with, including the use of devices, the built environment, and the demands and complexities of patient care. Some key challenges in infection prevention, such as delayed feedback to healthcare workers, high cognitive workload, and poor ergonomic design, are explained, as is how human factors engineering can be used for improvement and increased compliance with practices to prevent hospital-acquired infections.

  15. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  16. Yes we can! The Raffles Dialogue on Human Wellbeing and Security

    Directory of Open Access Journals (Sweden)

    Dr. Tikki Pang

    2015-08-01

    Full Text Available The future of human wellbeing and security depends on our ability to deal with the multiple effects of globalisation and on adoption of a new paradigm and philosophy for living and for health that emphasises people's wellbeing and social justice. Such was the topic of the inaugural Raffles Dialogue on Human Wellbeing and Security held in Singapore on Feb 2–3, 2015. Participants agreed that, to achieve these goals, four conditions must be met. First, equity must be integral to the implementation of technology. Second, there is an urgent need for innovations within our global institutions to make them “fit for purpose” in a rapidly changing world. Third, we must find the right balance between the roles of government and markets so that all those in need can access affordable medicine and health care. Finally, we must realise that we live in a small and interdependent “global village”, where Asian countries need to assume greater leadership of our global village councils. This is the great imperative of our times.

  17. Audited credential delegation: a usable security solution for the virtual physiological human toolkit

    Science.gov (United States)

    Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.

    2011-01-01

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214

  18. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    Science.gov (United States)

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-06

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.

  19. International Security Presence in Kosovo and its Human Rights Implications

    Directory of Open Access Journals (Sweden)

    Istrefi Remzije

    2017-11-01

    Full Text Available In this article I will examine the powers and activities of NATO-led Kosovo forces (KFOR and their impact on human rights protection in Kosovo. Through this examination, I seek to answer the following questions: which KFOR actions affected the human rights of Kosovars? Does KFOR carry out responsibilities and abide by the obligations normally imposed upon nation-states? And is there a solution available when the alleged violator is KFOR? KFOR is responsible for carrying out military tasks and for ‘shouldering’ UNMIK and local security forces in some civilian peace-building tasks. In the course of the exercise of its mandate, there were alleged complaints of human rights violations by KFOR. The legal implications of these alleged complaints against KFOR (inactions will also be discussed.

  20. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  1. Remote secure observing for the Faulkes Telescopes

    Science.gov (United States)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  2. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  3. The Humanistic Side of Engineering: Considering Social Science and Humanities Dimensions of Engineering in Education and Research

    OpenAIRE

    Hynes, Morgan; Swenson, Jessica

    2013-01-01

    Mathematics and science knowledge/skills are most commonly associated with engineering’s pre-requisite knowledge. Our goals in this paper are to argue for a more systematic inclusion of social science and humanities knowledge in the introduction of engineering to K-12 students. As part of this argument, we present a construct for framing the humanistic side of engineering with illustrative examples of what appealing to the humanistic side of engineering can look like in a classroom setting, a...

  4. Security controls in a Cullinet database environment

    International Nuclear Information System (INIS)

    Thompson, R.E.

    1988-01-01

    Security controls using Cullinet's Integrated Data Management System (IDMS) are examined. IDMS software integrity problems, with emphasis on security package interfaces, are disclosed. Solutions applied at Sandia Laboratories Engineering Information Management computing facilty are presented. An overall IDMS computer security philosophy is reviewed

  5. The case for applying tissue engineering methodologies to instruct human organoid morphogenesis.

    Science.gov (United States)

    Marti-Figueroa, Carlos R; Ashton, Randolph S

    2017-05-01

    Three-dimensional organoids derived from human pluripotent stem cell (hPSC) derivatives have become widely used in vitro models for studying development and disease. Their ability to recapitulate facets of normal human development during in vitro morphogenesis produces tissue structures with unprecedented biomimicry. Current organoid derivation protocols primarily rely on spontaneous morphogenesis processes to occur within 3-D spherical cell aggregates with minimal to no exogenous control. This yields organoids containing microscale regions of biomimetic tissues, but at the macroscale (i.e. 100's of microns to millimeters), the organoids' morphology, cytoarchitecture, and cellular composition are non-biomimetic and variable. The current lack of control over in vitro organoid morphogenesis at the microscale induces aberrations at the macroscale, which impedes realization of the technology's potential to reproducibly form anatomically correct human tissue units that could serve as optimal human in vitro models and even transplants. Here, we review tissue engineering methodologies that could be used to develop powerful approaches for instructing multiscale, 3-D human organoid morphogenesis. Such technological mergers are critically needed to harness organoid morphogenesis as a tool for engineering functional human tissues with biomimetic anatomy and physiology. Human PSC-derived 3-D organoids are revolutionizing the biomedical sciences. They enable the study of development and disease within patient-specific genetic backgrounds and unprecedented biomimetic tissue microenvironments. However, their uncontrolled, spontaneous morphogenesis at the microscale yields inconsistences in macroscale organoid morphology, cytoarchitecture, and cellular composition that limits their standardization and application. Integration of tissue engineering methods with organoid derivation protocols could allow us to harness their potential by instructing standardized in vitro morphogenesis

  6. The Humanistic Side of Engineering: Considering Social Science and Humanities Dimensions of Engineering in Education and Research

    Science.gov (United States)

    Hynes, Morgan; Swenson, Jessica

    2013-01-01

    Mathematics and science knowledge/skills are most commonly associated with engineering's pre-requisite knowledge. Our goals in this paper are to argue for a more systematic inclusion of social science and humanities knowledge in the introduction of engineering to K-12 students. As part of this argument, we present a construct for framing the…

  7. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  8. A system engineer's Perspective on Human Errors For a more Effective Management of Human Factors in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Yong-Hee; Jang, Tong-Il; Lee, Soo-Kil

    2007-01-01

    The management of human factors in nuclear power plants (NPPs) has become one of the burden factors during their operating period after the design and construction period. Almost every study on the major accidents emphasizes the prominent importance of the human errors. Regardless of the regulatory requirements such as Periodic Safety Review, the management of human factors would be a main issue to reduce the human errors and to enhance the performance of plants. However, it is not easy to find out a more effective perspective on human errors to establish the engineering implementation plan for preventing them. This paper describes a system engineer's perspectives on human errors and discusses its application to the recent study on the human error events in Korean NPPs

  9. Discussion on verification criterion and method of human factors engineering for nuclear power plant controller

    International Nuclear Information System (INIS)

    Yang Hualong; Liu Yanzi; Jia Ming; Huang Weijun

    2014-01-01

    In order to prevent or reduce human error and ensure the safe operation of nuclear power plants, control device should be verified from the perspective of human factors engineering (HFE). The domestic and international human factors engineering guidelines about nuclear power plant controller were considered, the verification criterion and method of human factors engineering for nuclear power plant controller were discussed and the application examples were provided for reference in this paper. The results show that the appropriate verification criterion and method should be selected to ensure the objectivity and accuracy of the conclusion. (authors)

  10. On recent advances in human engineering.

    Science.gov (United States)

    Anton, Roman

    2016-01-01

    Advances in embryology, genetics, and regenerative medicine regularly attract attention from scientists, scholars, journalists, and policymakers, yet implications of these advances may be broader than commonly supposed. Laboratories culturing human embryos, editing human genes, and creating human-animal chimeras have been working along lines that are now becoming intertwined. Embryogenic methods are weaving traditional in vivo and in vitro distinctions into a new "in vivitro" (in life in glass) fabric. These and other methods known to be in use or thought to be in development promise soon to bring society to startling choices and discomfiting predicaments, all in a global effort to supply reliably rejuvenating stem cells, to grow immunologically nonprovocative replacement organs, and to prevent, treat, cure, or even someday eradicate diseases having genetic or epigenetic mechanisms. With humanity's human-engineering era now begun, procedural prohibitions, funding restrictions, institutional controls, and transparency rules are proving ineffective, and business incentives are migrating into the most basic life-sciences inquiries, wherein lie huge biomedical potentials and bioethical risks. Rights, health, and heritage are coming into play with bioethical presumptions and formal protections urgently needing reassessment.

  11. Video performance for high security applications

    International Nuclear Information System (INIS)

    Connell, Jack C.; Norman, Bradley C.

    2010-01-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  12. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  13. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  14. Security and Network Operations [video

    OpenAIRE

    Myrick, Matthew

    2012-01-01

    Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.

  15. Site-Specific Genome Engineering in Human Pluripotent Stem Cells.

    Science.gov (United States)

    Merkert, Sylvia; Martin, Ulrich

    2016-06-24

    The possibility to generate patient-specific induced pluripotent stem cells (iPSCs) offers an unprecedented potential of applications in clinical therapy and medical research. Human iPSCs and their differentiated derivatives are tools for diseases modelling, drug discovery, safety pharmacology, and toxicology. Moreover, they allow for the engineering of bioartificial tissue and are promising candidates for cellular therapies. For many of these applications, the ability to genetically modify pluripotent stem cells (PSCs) is indispensable, but efficient site-specific and safe technologies for genetic engineering of PSCs were developed only recently. By now, customized engineered nucleases provide excellent tools for targeted genome editing, opening new perspectives for biomedical research and cellular therapies.

  16. 40 CFR 85.1708 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  17. Human-factors engineering-control-room design review: Shoreham Nuclear Power Station. Draft audit report

    International Nuclear Information System (INIS)

    Peterson, L.R.; Preston-Smith, J.; Savage, J.W.; Rousseau, W.F.

    1981-01-01

    A human factors engineering preliminary design review of the Shoreham control room was performed at the site on March 30 through April 3, 1981. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. This report was prepared on the basis of the HFEB's review of the applicant's Preliminary Design Assessment and the human factors engineering design review/audit performed at the site. The presented sections are numbered to conform to the guidelines of the draft version of NUREG-0700. They summarize the teams's observations of the control room design and layout, and of the control room operators' interface with the control room environment

  18. Humans to Mars: The Greatest Adventure in Human History

    Science.gov (United States)

    Levine, Joel S.; Schild,Rudy

    2011-01-01

    The reasons for a human mission to Mars are many and include (1) World technological leadership, (2) Enhanced national security, (3) Enhanced economic vitality, (4) The human urge to explore new and distant frontiers, (5) Scientific discovery (how did Mars evolve from an early Earth-like, hospitable planet to its present inhospitable state? Is there life on Mars?) (6) Inspiring the American public and the next generation of scientists and engineers (following the launch of Sputnik I by the USSR on October 4, 1957, the U. S. and the rest of the world witnessed a significant increase in the number of students going into science and engineering), (7) Develop new technologies for potential non-space spin-off applications, and, (8) Enhanced national prestige, etc. Other reasons for colonizing the Red Planet are more catastrophic in nature, including Mars as a safe haven for the survival of the human species in the event of an impact with a large asteroid (remember the demise of the dinosaurs 65-million years as a result of an asteroid impact!). Some have also suggested that the colonization of Mars may be a solution to the global exponential population explosion on our planet! A human mission to and the colonization of the Red Planet requires multi-disciplined expertise in many areas including engineering, technology, science, human health and medicine and the human psychological and behavior. To capture the relevant areas of needed expertise, we have invited a group of more than 70 U. S. and foreign experts in these areas, including astronauts, scientists, engineers, technologists, medical doctors, psychologists and economists to share their views and thoughts on a human mission to Mars.

  19. Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2014-01-01

    Full Text Available Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  20. Time pattern locking scheme for secure multimedia contents in human-centric device.

    Science.gov (United States)

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  1. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  2. 40 CFR 90.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  3. 40 CFR 89.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  4. Cooperative and Human Aspects of Software Engineering (CHASE 2010)

    DEFF Research Database (Denmark)

    Dittrich, Yvonne; De Souza, Cleidson; Korpela, Mikko

    2010-01-01

    Software is created by people---software engineers---working in varied environments, under various conditions. Thus understanding cooperative and human aspect of software development is crucial to comprehend how methods and tools are used, and thereby improving the creation and maintenance...... research on human and cooperative aspects of software engineering. We aim at providing both a meeting place for the growing community and the possibility for researchers interested in joining the field to present their work in progress and get an overview over the field....... of software. Inspired by the hosting country's concept of co-responsibility -- ubuntu -- we especially invited contributions that address community-based development like open source development and sustainability of ICT eco-systems. The goal of this workshop is to provide a forum for discussing high quality...

  5. Status of human factors engineering system design in Europe

    International Nuclear Information System (INIS)

    Ives, G.

    1990-01-01

    A review of the European status of human factors engineering has been carried out covering a wide scope of activities which includes psychology, cognitive science, ergonomics, design, training, procedure writing, operating, artificial intelligence and expert systems. There is an increasing awareness of the part that human factors play in major nuclear power plant accidents. The emphasis of attention in human factors is changing. In some areas there are encouraging signs of progress and development, but in other areas there is still scope for improvement

  6. How do radiologists use the human search engine?

    International Nuclear Information System (INIS)

    Wolfe, Jeremy M.; Evans, Karla K.; Drew, Trafton; Aizenman, Avigael; Josephs, Emilie

    2016-01-01

    Radiologists perform many 'visual search tasks' in which they look for one or more instances of one or more types of target item in a medical image (e.g. cancer screening). To understand and improve how radiologists do such tasks, it must be understood how the human 'search engine' works. This article briefly reviews some of the relevant work into this aspect of medical image perception. Questions include how attention and the eyes are guided in radiologic search? How is global (image-wide) information used in search? How might properties of human vision and human cognition lead to errors in radiologic search? (authors)

  7. Validation of human factor engineering integrated system

    International Nuclear Information System (INIS)

    Fang Zhou

    2013-01-01

    Apart from hundreds of thousands of human-machine interface resources, the control room of a nuclear power plant is a complex system integrated with many factors such as procedures, operators, environment, organization and management. In the design stage, these factors are considered by different organizations separately. However, whether above factors could corporate with each other well in operation and whether they have good human factors engineering (HFE) design to avoid human error, should be answered in validation of the HFE integrated system before delivery of the plant. This paper addresses the research and implementation of the ISV technology based on case study. After introduction of the background, process and methodology of ISV, the results of the test are discussed. At last, lessons learned from this research are summarized. (authors)

  8. Quantum Security of Cryptographic Primitives

    OpenAIRE

    Gagliardoni, Tommaso

    2017-01-01

    We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). Moreover, there exist also hybrid models, where traditional crypto...

  9. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  10. Processing multilevel secure test and evaluation information

    Science.gov (United States)

    Hurlburt, George; Hildreth, Bradley; Acevedo, Teresa

    1994-07-01

    The Test and Evaluation Community Network (TECNET) is building a Multilevel Secure (MLS) system. This system features simultaneous access to classified and unclassified information and easy access through widely available communications channels. It provides the necessary separation of classification levels, assured through the use of trusted system design techniques, security assessments and evaluations. This system enables cleared T&E users to view and manipulate classified and unclassified information resources either using a single terminal interface or multiple windows in a graphical user interface. TECNET is in direct partnership with the National Security Agency (NSA) to develop and field the MLS TECNET capability in the near term. The centerpiece of this partnership is a state-of-the-art Concurrent Systems Security Engineering (CSSE) process. In developing the MLS TECNET capability, TECNET and NSA are providing members, with various expertise and diverse backgrounds, to participate in the CSSE process. The CSSE process is founded on the concepts of both Systems Engineering and Concurrent Engineering. Systems Engineering is an interdisciplinary approach to evolve and verify an integrated and life cycle balanced set of system product and process solutions that satisfy customer needs (ASD/ENS-MIL STD 499B 1992). Concurrent Engineering is design and development using the simultaneous, applied talents of a diverse group of people with the appropriate skills. Harnessing diverse talents to support CSSE requires active participation by team members in an environment that both respects and encourages diversity.

  11. Human-factors engineering control-room design review/audit: Waterford 3 SES Generating Station, Louisiana Power and Light Company

    International Nuclear Information System (INIS)

    Savage, J.W.

    1983-01-01

    A human factors engineering design review/audit of the Waterford-3 control room was performed at the site on May 10 through May 13, 1982. The report was prepared on the basis of the HFEB's review of the applicant's Preliminary Human Engineering Discrepancy (PHED) report and the human factors engineering design review performed at the site. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. The review team was assisted by consultants from Lawrence Livermore National Laboratory (University of California), Livermore, California

  12. Ambulatory Antibiotic Stewardship through a Human Factors Engineering Approach: A Systematic Review.

    Science.gov (United States)

    Keller, Sara C; Tamma, Pranita D; Cosgrove, Sara E; Miller, Melissa A; Sateia, Heather; Szymczak, Julie; Gurses, Ayse P; Linder, Jeffrey A

    2018-01-01

    In the United States, most antibiotics are prescribed in ambulatory settings. Human factors engineering, which explores interactions between people and the place where they work, has successfully improved quality of care. However, human factors engineering models have not been explored to frame what is known about ambulatory antibiotic stewardship (AS) interventions and barriers and facilitators to their implementation. We conducted a systematic review and searched OVID MEDLINE, Embase, Scopus, Web of Science, and CINAHL to identify controlled interventions and qualitative studies of ambulatory AS and determine whether and how they incorporated principles from a human factors engineering model, the Systems Engineering Initiative for Patient Safety 2.0 model. This model describes how a work system (ambulatory clinic) contributes to a process (antibiotic prescribing) that leads to outcomes. The work system consists of 5 components, tools and technology, organization, person, tasks, and environment, within an external environment. Of 1,288 abstracts initially identified, 42 quantitative studies and 17 qualitative studies met inclusion criteria. Effective interventions focused on tools and technology (eg, clinical decision support and point-of-care testing), the person (eg, clinician education), organization (eg, audit and feedback and academic detailing), tasks (eg, delayed antibiotic prescribing), the environment (eg, commitment posters), and the external environment (media campaigns). Studies have not focused on clinic-wide approaches to AS. A human factors engineering approach suggests that investigating the role of the clinic's processes or physical layout or external pressures' role in antibiotic prescribing may be a promising way to improve ambulatory AS. © Copyright 2018 by the American Board of Family Medicine.

  13. Identification of advanced human factors engineering analysis, design and evaluation methods

    International Nuclear Information System (INIS)

    Plott, C.; Ronan, A. M.; Laux, L.; Bzostek, J.; Milanski, J.; Scheff, S.

    2006-01-01

    NUREG-0711 Rev.2, 'Human Factors Engineering Program Review Model,' provides comprehensive guidance to the Nuclear Regulatory Commission (NRC) in assessing the human factors practices employed by license applicants for Nuclear Power Plant control room designs. As software based human-system interface (HSI) technologies supplant traditional hardware-based technologies, the NRC may encounter new HSI technologies or seemingly unconventional approaches to human factors design, analysis, and evaluation methods which NUREG-0711 does not anticipate. A comprehensive survey was performed to identify advanced human factors engineering analysis, design and evaluation methods, tools, and technologies that the NRC may encounter in near term future licensee applications. A review was conducted to identify human factors methods, tools, and technologies relevant to each review element of NUREG-0711. Additionally emerging trends in technology which have the potential to impact review elements, such as Augmented Cognition, and various wireless tools and technologies were identified. The purpose of this paper is to provide an overview of the survey results and to highlight issues that could be revised or adapted to meet with emerging trends. (authors)

  14. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  15. Human Security in the Context of Sudan's State Crisis: The Case of ...

    African Journals Online (AJOL)

    ... lost more than 5 million citizens in civil wars. A violent confl ict erupted in 2003, with more than 250 000 civilians killed and more than 2 million people displaced. This article traces and examines the genesis and magnitude of human security challenges in the Darfur region of the Sudan. Africa Insight Vol. 37 (4) 2008 pp.

  16. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  17. Mechanical stimulation improves tissue-engineered human skeletal muscle

    Science.gov (United States)

    Powell, Courtney A.; Smiley, Beth L.; Mills, John; Vandenburgh, Herman H.

    2002-01-01

    Human bioartificial muscles (HBAMs) are tissue engineered by suspending muscle cells in collagen/MATRIGEL, casting in a silicone mold containing end attachment sites, and allowing the cells to differentiate for 8 to 16 days. The resulting HBAMs are representative of skeletal muscle in that they contain parallel arrays of postmitotic myofibers; however, they differ in many other morphological characteristics. To engineer improved HBAMs, i.e., more in vivo-like, we developed Mechanical Cell Stimulator (MCS) hardware to apply in vivo-like forces directly to the engineered tissue. A sensitive force transducer attached to the HBAM measured real-time, internally generated, as well as externally applied, forces. The muscle cells generated increasing internal forces during formation which were inhibitable with a cytoskeleton depolymerizer. Repetitive stretch/relaxation for 8 days increased the HBAM elasticity two- to threefold, mean myofiber diameter 12%, and myofiber area percent 40%. This system allows engineering of improved skeletal muscle analogs as well as a nondestructive method to determine passive force and viscoelastic properties of the resulting tissue.

  18. Security and privacy in smart grids

    CERN Document Server

    Xiao, Yang

    2013-01-01

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today'

  19. 40 CFR 94.908 - National security exemption.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...

  20. Human factors engineering report for the cold vacuum drying facility

    Energy Technology Data Exchange (ETDEWEB)

    IMKER, F.W.

    1999-06-30

    The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF.

  1. Human factors engineering report for the cold vacuum drying facility

    International Nuclear Information System (INIS)

    IMKER, F.W.

    1999-01-01

    The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF

  2. CRISPR Genome Engineering for Human Pluripotent Stem Cell Research.

    Science.gov (United States)

    Chaterji, Somali; Ahn, Eun Hyun; Kim, Deok-Ho

    2017-01-01

    The emergence of targeted and efficient genome editing technologies, such as repurposed bacterial programmable nucleases (e.g., CRISPR-Cas systems), has abetted the development of cell engineering approaches. Lessons learned from the development of RNA-interference (RNA-i) therapies can spur the translation of genome editing, such as those enabling the translation of human pluripotent stem cell engineering. In this review, we discuss the opportunities and the challenges of repurposing bacterial nucleases for genome editing, while appreciating their roles, primarily at the epigenomic granularity. First, we discuss the evolution of high-precision, genome editing technologies, highlighting CRISPR-Cas9. They exist in the form of programmable nucleases, engineered with sequence-specific localizing domains, and with the ability to revolutionize human stem cell technologies through precision targeting with greater on-target activities. Next, we highlight the major challenges that need to be met prior to bench-to-bedside translation, often learning from the path-to-clinic of complementary technologies, such as RNA-i. Finally, we suggest potential bioinformatics developments and CRISPR delivery vehicles that can be deployed to circumvent some of the challenges confronting genome editing technologies en route to the clinic.

  3. Application of human engineering to design of central control room and evaluation

    International Nuclear Information System (INIS)

    Tani, Mamoru

    1986-01-01

    The central control room of a nuclear power station is the center of the operation control, monitoring and management of the plant, therefore, the design by the application of human engineering has been performed on the basis of the experience and achievement in thermal power stations and other industries. In this report, the application of human engineering to the development of the new control boards for PWRs and the evaluation are described. In a nuclear power station, the number of the machinery and equipment composing it is large, and the interrelation among them is complex, accordingly, in the information processing system for operation monitoring and control, the man-machine interface works with high density. The concept of multiple protection design requires to show numerous plant parameters on a central control board, and this also complicates the man-machine interface. The introduction of human engineering was seriously studied after the TMI accident. In order to increase the safety and reliability of a plant, the new central control and monitoring system aims at facilitating operation and monitoring, and lightening burden and preventing mistakes in handling and judgement. The operational sequence diagram and mock-up varification, the application of human engineering and the evaluation, the synthetic real-time verification at the time of abnormality and accident, and the evaluation of the reliability improvement of men are reported. (Kako, I.)

  4. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  5. Human factor engineering analysis for computerized human machine interface design issues

    International Nuclear Information System (INIS)

    Wang Zhifang; Gu Pengfei; Zhang Jianbo

    2010-01-01

    The application of digital I and C technology in nuclear power plants is a significant improvement in terms of functional performances and flexibility, and it also poses a challenge to operation safety. Most of the new NPPs under construction are adopting advanced control room design which utilizes the computerized human machine interface (HMI) as the main operating means. Thus, it greatly changes the way the operators interact with the plant. This paper introduces the main challenges brought out by computerized technology on the human factor engineering aspect and addresses the main issues to be dealt with in the computerized HMI design process. Based on a operator task-resources-cognitive model, it states that the root cause of human errors is the mismatch between resources demand and their supply. And a task-oriented HMI design principle is discussed. (authors)

  6. Requirements engineering for trust management: Model, methodology, and reasoning

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Mylopoulos, J.; Zannone, N.

    2006-01-01

    A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open

  7. Engineering secure Internet of Things systems

    CERN Document Server

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  8. EXPERIMENTAL SEMIOTICS: AN ENGINE OF DISCOVERY FOR UNDERSTANDING HUMAN COMMUNICATION

    OpenAIRE

    BRUNO GALANTUCCI; GARETH ROBERTS

    2012-01-01

    The recent growth of Experimental Semiotics (ES) offers us a new option to investigate human communication. We briefly introduce ES, presenting results from three themes of research which emerged within it. Then we illustrate the contribution ES can make to the investigation of human communication systems, particularly in comparison with the other existing options. This comparison highlights how ES can provide an engine of discovery for understanding human communication. In fact, in complemen...

  9. Human Factors Engineering: Current and Emerging Dual-Use Applications

    Science.gov (United States)

    Chandlee, G. O.; Goldsberry, B. S.

    1994-01-01

    Human Factors Engineering is a multidisciplinary endeavor in which information pertaining to human characteristics is used in the development of systems and machines. Six representatives considered to be experts from the public and private sectors were surveyed in an effort to identify the potential dual-use of human factors technology. Each individual was asked to provide a rating as to the dual-use of 85 identified NASA technologies. Results of the survey were as follows: nearly 75 percent of the technologies were identified at least once as high dual-use by one of the six survey respondents, and nearly 25 percent of the identified NASA technologies were identified as high dual-use technologies by a majority of the respondents. The perceived level of dual-use appeared to be independent of the technology category. Successful identification of dual-use technology requires expanded input from industry. As an adjunct, cost-benefit analysis should be conducted to identify the feasibility of the dual-use technology. Concurrent with this effort should be an examination of precedents established by other technologies in other industrial settings. Advances in human factors and systems engineering are critical to reduce risk in any workplace and to enhance industrial competitiveness.

  10. Human Factors Engineering Incorporated into the Carolina Power and Light company's nuclear power plant control panel modifications

    International Nuclear Information System (INIS)

    Beith, D.M.; Shoemaker, E.M.; Horn, K.; Boush, D.

    1988-01-01

    Maintaining human factors conventions/practices that were established during the Detailed Control Design Review (DCRDR), is difficult if Human Factors Engineering (HFE) is not incorporated into the plant modification process. This paper presents the approach used at Carolina Power and Light's nuclear power plants that has successfully incorporated human factors engineering into their plant modification process. An HFE Design Guide or HFE Specification was developed which is used by the design engineers or plant engineering support groups in the preparation of plant modifications

  11. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  12. Information engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hunt, D.N.

    1997-02-01

    The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.

  13. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  14. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  15. Nuclear Engineering Education in Support of Thailand’s Nuclear Power Programme

    International Nuclear Information System (INIS)

    Chanyotha, S.; Pengvanich, P.; Nilsuwankosit, S.

    2015-01-01

    This paper aims to introduce the nuclear engineering education at the Department of Nuclear Engineering, Chulalongkon University, Bangkok Thailand. The department has been offering curriculum in nuclear engineering to support the national nuclear power programme since 1970s. It is the oldest established nuclear engineering educational programme in the South East Asia region. Nevertheless, since the nuclear power programme has been postponed several times due to various reasons, the educational programme at the department has been continuously adapted to meet the nation’s needs. Several areas of study have been introduced, including nuclear power engineering, industrial applications of radioisotope, nuclear instrumentation, radioisotope production, radiation processing, environment and safety, nuclear materials, as well as the newly created nuclear security and non-proliferation. With the renewed interest in using nuclear power in Thailand in 2007, the department has been actively assisting both the government and the electric utility in preparing human resources to support the nuclear power programme through various educational and training modules. Realizing the importance of establishing and balancing all 3 aspects of the nuclear 3S (safety, security and safeguard) in Thailand and in the Southeast Asian region. The new curriculum of nuclear security and safeguard programme has been offered since 2013. Since the establishment, the department has produced hundreds of graduates (Diploma, Master’s, and Ph.D. levels) to feed the continuously expanding Thai nuclear industry. The full paper will provide detailed information of the curriculum, the challenges and obstacles that the department has encountered, as well as the national and international linkages which have been established over the years. (author)

  16. Human and organization factors: engineering operating safety into offshore structures

    International Nuclear Information System (INIS)

    Bea, Robert G.

    1998-01-01

    History indicates clearly that the safety of offshore structures is determined primarily by the humans and organizations responsible for these structures during their design, construction, operation, maintenance, and decommissioning. If the safety of offshore structures is to be preserved and improved, then attention of engineers should focus on to how to improve the reliability of the offshore structure 'system,' including the people that come into contact with the structure during its life-cycle. This article reviews and discusss concepts and engineering approaches that can be used in such efforts. Two specific human factor issues are addressed: (1) real-time management of safety during operations, and (2) development of a Safety Management Assessment System to help improve the safety of offshore structures

  17. Effects of mechanical loading on human mesenchymal stem cells for cartilage tissue engineering.

    Science.gov (United States)

    Choi, Jane Ru; Yong, Kar Wey; Choi, Jean Yu

    2018-03-01

    Today, articular cartilage damage is a major health problem, affecting people of all ages. The existing conventional articular cartilage repair techniques, such as autologous chondrocyte implantation (ACI), microfracture, and mosaicplasty, have many shortcomings which negatively affect their clinical outcomes. Therefore, it is essential to develop an alternative and efficient articular repair technique that can address those shortcomings. Cartilage tissue engineering, which aims to create a tissue-engineered cartilage derived from human mesenchymal stem cells (MSCs), shows great promise for improving articular cartilage defect therapy. However, the use of tissue-engineered cartilage for the clinical therapy of articular cartilage defect still remains challenging. Despite the importance of mechanical loading to create a functional cartilage has been well demonstrated, the specific type of mechanical loading and its optimal loading regime is still under investigation. This review summarizes the most recent advances in the effects of mechanical loading on human MSCs. First, the existing conventional articular repair techniques and their shortcomings are highlighted. The important parameters for the evaluation of the tissue-engineered cartilage, including chondrogenic and hypertrophic differentiation of human MSCs are briefly discussed. The influence of mechanical loading on human MSCs is subsequently reviewed and the possible mechanotransduction signaling is highlighted. The development of non-hypertrophic chondrogenesis in response to the changing mechanical microenvironment will aid in the establishment of a tissue-engineered cartilage for efficient articular cartilage repair. © 2017 Wiley Periodicals, Inc.

  18. Your employees: the front line in cyber security

    OpenAIRE

    Ashenden, D

    2016-01-01

    First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/)

  19. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  20. Educating the next generation of nuclear safeguards and security experts at TAMU

    International Nuclear Information System (INIS)

    Charlton, William S.; Boyle, David; Chirayath, Sunil; Ford, David G.; Gariazzo, Claudio A.; Marianno, Craig; Ragusa, Kelley; Solodov, Alexander

    2011-01-01

    The Nuclear Security Science and Policy Institute (NSSPI) has established a Nuclear Nonproliferation specialization for the Master of Science degree within the Nuclear Engineering Department at Texas A and M University (TAMU). Since 2004, twenty-eight students have received MS degrees in this area and over 200 (technical and policy) students have taken classes offered by NSSPI at TAMU. The model for educating safeguards and security experts is being changed at TAMU. Beyond conventional classroom lectures, NSSPI has developed alternative educational models based on practical experience, asynchronous learning portals, and virtual courses in both nuclear safeguards and nuclear security. Due to the experimental and practical past experiences of NSSPI staff and faculty, a heavy hands-on component has been implemented for TAMU nuclear engineering graduate students: hands-on education at Oak Ridge National Laboratory, visiting nuclear installations in other countries to discuss applied safeguards, and summer internships at several national laboratories. In an effort to disseminate basic nuclear education for professionals and students around the globe, NSSPI has developed a publically-available online resource that offers self-paced, independent course modules in basic safeguards and security education: the Nuclear Safeguards Education Portal. Another venture utilized by NSSPI is using a virtual TAMU campus to hold classes for students at a distance. NSSPI is building upon a successful academic program by embracing new educational means. This paper describes the current efforts NSSPI and TAMU have undertaken in strengthening the nuclear nonproliferation, safeguards and security human resource capacity domestically and internationally and the lessons learned from these efforts. (author)

  1. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  2. Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    Science.gov (United States)

    Sassaman, Len

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.

  3. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    Science.gov (United States)

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  4. Human-factors engineering control-room design review/audit report: Byron Generating Station, Commonwealth Edison Company

    International Nuclear Information System (INIS)

    Savage, J.W.

    1983-01-01

    A human factors engineering design review/audit of the Byron Unit 1 control room was performed at the site on November 17 through November 19, 1981. This review was accomplished using the Unit 2 control room appropriately mocked-up to reflect design changes already committed to be incorporated in Unit 1. The report was prepared on the basis of the HFEB's audit of the applicant's Preliminary Design Assessment report and the human factors engineering design review performed at the site. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. The review team was assisted by consultants from BioTechnology, Inc. (Falls Church, Virginia), and from Lawrence Livermore National Laboratory (University of California), Livermore, California

  5. HOW DO RADIOLOGISTS USE THE HUMAN SEARCH ENGINE?

    Science.gov (United States)

    Wolfe, Jeremy M; Evans, Karla K; Drew, Trafton; Aizenman, Avigael; Josephs, Emilie

    2016-06-01

    Radiologists perform many 'visual search tasks' in which they look for one or more instances of one or more types of target item in a medical image (e.g. cancer screening). To understand and improve how radiologists do such tasks, it must be understood how the human 'search engine' works. This article briefly reviews some of the relevant work into this aspect of medical image perception. Questions include how attention and the eyes are guided in radiologic search? How is global (image-wide) information used in search? How might properties of human vision and human cognition lead to errors in radiologic search? © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. Advancing biomaterials of human origin for tissue engineering

    Science.gov (United States)

    Chen, Fa-Ming; Liu, Xiaohua

    2015-01-01

    Biomaterials have played an increasingly prominent role in the success of biomedical devices and in the development of tissue engineering, which seeks to unlock the regenerative potential innate to human tissues/organs in a state of deterioration and to restore or reestablish normal bodily function. Advances in our understanding of regenerative biomaterials and their roles in new tissue formation can potentially open a new frontier in the fast-growing field of regenerative medicine. Taking inspiration from the role and multi-component construction of native extracellular matrices (ECMs) for cell accommodation, the synthetic biomaterials produced today routinely incorporate biologically active components to define an artificial in vivo milieu with complex and dynamic interactions that foster and regulate stem cells, similar to the events occurring in a natural cellular microenvironment. The range and degree of biomaterial sophistication have also dramatically increased as more knowledge has accumulated through materials science, matrix biology and tissue engineering. However, achieving clinical translation and commercial success requires regenerative biomaterials to be not only efficacious and safe but also cost-effective and convenient for use and production. Utilizing biomaterials of human origin as building blocks for therapeutic purposes has provided a facilitated approach that closely mimics the critical aspects of natural tissue with regard to its physical and chemical properties for the orchestration of wound healing and tissue regeneration. In addition to directly using tissue transfers and transplants for repair, new applications of human-derived biomaterials are now focusing on the use of naturally occurring biomacromolecules, decellularized ECM scaffolds and autologous preparations rich in growth factors/non-expanded stem cells to either target acceleration/magnification of the body's own repair capacity or use nature's paradigms to create new tissues for

  7. The Utah Nuclear Engineering Program and DevonWay are Developing One and Unique Approach to PLiM for Securing the Nation's Nuclear Future

    International Nuclear Information System (INIS)

    Jevremovic, Tatjana; Choe, Dongok; Yang, Haori; White, Sally; Kelly, Mike

    2012-01-01

    The safety culture involving a comprehensive training of the employed engineers at the power plant facilities is neither a simple nor a straightforward task. With aging management and operators, impact of the Fukushima nuclear event, unforeseen and timely unpredictable effects of nuclear memories (Three Mile Island, Chernobyl, Second World War) as evoked every time we have worldwide challenges or discussions of where the nuclear technology will/would further develop, we face a fearful question - is our educational and training approach the right one; is it going to assure continuous and secured practices in providing safe operation of our nuclear power plants?... We at the University of Utah with our just recently revitalized Nuclear Engineering Program, find that the root of securing the safety culture and providing its sustainability in our existing and future nuclear power plants, lies in very early educational practices. We believe that every program in nuclear engineering education shall include training in nuclear safety. That training shall certainly include industrial based practices and involve experts from the companies that develop and contribute to nuclear power safety to add to class practices at the University teaching settings. Working with DevonWay, a leading company in developing software to improve the safety cultures at nuclear power plants in the country, we have implemented the 'Track and Trace' software into our nuclear engineering program, emphasizing high quality training of our undergraduate and graduate students, and promoting a higher level safety culture practices at our nuclear engineering facilities. (author)

  8. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Directory of Open Access Journals (Sweden)

    Ani Kelechi Johnmary

    2014-04-01

    Full Text Available The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassination-based human insecurity, robbery/kidnapping related human insecurity, political-related human insecurity, ethnic-based human insecurity, inter-communal conflict-related human insecurity, religious-motivated human insecurity and multi-dimensional conflict related human insecurity. The paper calles on all lovers of life and human dignity to rise up and defend the survival and existence of every breathing soul around him or her in this sovereign entity, called Nigeria.

  9. Reverse engineering validation using a benchmark synthetic gene circuit in human cells.

    Science.gov (United States)

    Kang, Taek; White, Jacob T; Xie, Zhen; Benenson, Yaakov; Sontag, Eduardo; Bleris, Leonidas

    2013-05-17

    Multicomponent biological networks are often understood incompletely, in large part due to the lack of reliable and robust methodologies for network reverse engineering and characterization. As a consequence, developing automated and rigorously validated methodologies for unraveling the complexity of biomolecular networks in human cells remains a central challenge to life scientists and engineers. Today, when it comes to experimental and analytical requirements, there exists a great deal of diversity in reverse engineering methods, which renders the independent validation and comparison of their predictive capabilities difficult. In this work we introduce an experimental platform customized for the development and verification of reverse engineering and pathway characterization algorithms in mammalian cells. Specifically, we stably integrate a synthetic gene network in human kidney cells and use it as a benchmark for validating reverse engineering methodologies. The network, which is orthogonal to endogenous cellular signaling, contains a small set of regulatory interactions that can be used to quantify the reconstruction performance. By performing successive perturbations to each modular component of the network and comparing protein and RNA measurements, we study the conditions under which we can reliably reconstruct the causal relationships of the integrated synthetic network.

  10. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  11. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  12. DRUMS: a human disease related unique gene mutation search engine.

    Science.gov (United States)

    Li, Zuofeng; Liu, Xingnan; Wen, Jingran; Xu, Ye; Zhao, Xin; Li, Xuan; Liu, Lei; Zhang, Xiaoyan

    2011-10-01

    With the completion of the human genome project and the development of new methods for gene variant detection, the integration of mutation data and its phenotypic consequences has become more important than ever. Among all available resources, locus-specific databases (LSDBs) curate one or more specific genes' mutation data along with high-quality phenotypes. Although some genotype-phenotype data from LSDB have been integrated into central databases little effort has been made to integrate all these data by a search engine approach. In this work, we have developed disease related unique gene mutation search engine (DRUMS), a search engine for human disease related unique gene mutation as a convenient tool for biologists or physicians to retrieve gene variant and related phenotype information. Gene variant and phenotype information were stored in a gene-centred relational database. Moreover, the relationships between mutations and diseases were indexed by the uniform resource identifier from LSDB, or another central database. By querying DRUMS, users can access the most popular mutation databases under one interface. DRUMS could be treated as a domain specific search engine. By using web crawling, indexing, and searching technologies, it provides a competitively efficient interface for searching and retrieving mutation data and their relationships to diseases. The present system is freely accessible at http://www.scbit.org/glif/new/drums/index.html. © 2011 Wiley-Liss, Inc.

  13. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    OpenAIRE

    Ani Kelechi Johnmary

    2014-01-01

    The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassinat...

  14. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  15. Improving Safety through Human Factors Engineering.

    Science.gov (United States)

    Siewert, Bettina; Hochman, Mary G

    2015-10-01

    Human factors engineering (HFE) focuses on the design and analysis of interactive systems that involve people, technical equipment, and work environment. HFE is informed by knowledge of human characteristics. It complements existing patient safety efforts by specifically taking into consideration that, as humans, frontline staff will inevitably make mistakes. Therefore, the systems with which they interact should be designed for the anticipation and mitigation of human errors. The goal of HFE is to optimize the interaction of humans with their work environment and technical equipment to maximize safety and efficiency. Special safeguards include usability testing, standardization of processes, and use of checklists and forcing functions. However, the effectiveness of the safety program and resiliency of the organization depend on timely reporting of all safety events independent of patient harm, including perceived potential risks, bad outcomes that occur even when proper protocols have been followed, and episodes of "improvisation" when formal guidelines are found not to exist. Therefore, an institution must adopt a robust culture of safety, where the focus is shifted from blaming individuals for errors to preventing future errors, and where barriers to speaking up-including barriers introduced by steep authority gradients-are minimized. This requires creation of formal guidelines to address safety concerns, establishment of unified teams with open communication and shared responsibility for patient safety, and education of managers and senior physicians to perceive the reporting of safety concerns as a benefit rather than a threat. © RSNA, 2015.

  16. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  17. Geological disposal: security and R and D. Security of 'second draft for R and D of geological disposal'

    International Nuclear Information System (INIS)

    Shiotsuki, Masao; Miyahara, Kaname

    2003-01-01

    The second draft for R and D of geological disposal (second draft) was arranged in 1999. The idea of security of geological disposal in the second draft is explained. The evaluation results of the uncertainty analysis and an example of evaluation of the effect of separation nuclear transmutation on the geological disposal are shown. The construction of strong engineered barrier is a basic idea of geological disposal system. Three processes such as isolation, engineering countermeasures and safety evaluation are carried out for the security of geological disposal. The security of geological environment for a long time of 12 sites in Japan was studied by data. Provability of production and enforcement of engineered barrier were confirmed by trial of over pack, tests and the present and future technologies developed. By using the conditions of reference case in the second draft, the evaluation results of dose effects in the two cases: 1) 90 to 99% Cs and Sr removed from HLW (High Level radioactive Waste) and 2) high stripping ratio of actinium series are explained. (S.Y.)

  18. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  19. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  20. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  1. Control room design and human engineering in power plants

    International Nuclear Information System (INIS)

    Herbst, L.; Hinz, W.

    1981-01-01

    Automation reduces the human work load. Employment of functional areas permits optimization of operational sequences. Computer based information processing makes it possible to output information in accordance with operating requirements. Design based on human engineering principles assures the quality of the interaction between the operator and the equipment. The degree to which these conceptional features play a role in design of power plant control rooms depends on the unit rating, the mode of operation and on the requirements respecting safety and availability of the plant. (orig./RW)

  2. p53 inhibits CRISPR-Cas9 engineering in human pluripotent stem cells.

    Science.gov (United States)

    Ihry, Robert J; Worringer, Kathleen A; Salick, Max R; Frias, Elizabeth; Ho, Daniel; Theriault, Kraig; Kommineni, Sravya; Chen, Julie; Sondey, Marie; Ye, Chaoyang; Randhawa, Ranjit; Kulkarni, Tripti; Yang, Zinger; McAllister, Gregory; Russ, Carsten; Reece-Hoyes, John; Forrester, William; Hoffman, Gregory R; Dolmetsch, Ricardo; Kaykas, Ajamete

    2018-06-11

    CRISPR/Cas9 has revolutionized our ability to engineer genomes and conduct genome-wide screens in human cells 1-3 . Whereas some cell types are amenable to genome engineering, genomes of human pluripotent stem cells (hPSCs) have been difficult to engineer, with reduced efficiencies relative to tumour cell lines or mouse embryonic stem cells 3-13 . Here, using hPSC lines with stable integration of Cas9 or transient delivery of Cas9-ribonucleoproteins (RNPs), we achieved an average insertion or deletion (indel) efficiency greater than 80%. This high efficiency of indel generation revealed that double-strand breaks (DSBs) induced by Cas9 are toxic and kill most hPSCs. In previous studies, the toxicity of Cas9 in hPSCs was less apparent because of low transfection efficiency and subsequently low DSB induction 3 . The toxic response to DSBs was P53/TP53-dependent, such that the efficiency of precise genome engineering in hPSCs with a wild-type P53 gene was severely reduced. Our results indicate that Cas9 toxicity creates an obstacle to the high-throughput use of CRISPR/Cas9 for genome engineering and screening in hPSCs. Moreover, as hPSCs can acquire P53 mutations 14 , cell replacement therapies using CRISPR/Cas9-enginereed hPSCs should proceed with caution, and such engineered hPSCs should be monitored for P53 function.

  3. 78 FR 37533 - Notice of Intent To Prepare a Programmatic Environmental Impact Statement for Engineered High...

    Science.gov (United States)

    2013-06-21

    ... that occur in nature without human intervention), and specifically engineered to produce more energy... Environmental Policy Act (NEPA) of 1969 (42 U.S.C. 4321 et seq.) requirements, the Council on Environmental... promoting U.S. energy security by providing reliable, clean, and affordable energy and strengthening U.S...

  4. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  5. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  6. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  7. Rapid Prototyping and the Human Factors Engineering Process

    Science.gov (United States)

    2016-08-29

    conventional systems development techniques. It is not clear, however, exactly how rapid prototyping could be used in relation to conventional human...factors engineering analyses. Therefore, an investigation of the use of the V APS virtual prototyping system was carried out in five organizations. The...results show that a variety of task analysis approaches can be used to initiate rapid prototyping . Overall, it appears that rapid prototyping

  8. Bridging future needs to todays companies' capabilities. competences of the new (human) engineer.

    NARCIS (Netherlands)

    Dr.Ir. Hay Geraedts; Dr. Ir. ing. C. Blokhuizen; Ir. M. Rutten; Ir. P. Leijten

    2001-01-01

    The Fontys University of professional Education, department of Mechanical Engineering, has started development of a new curriculum during the year 2000-2001, Human Mechanical Engineering (HME). Next to immersion of our students in actual technology practices, we aim to include for our students new

  9. Draft audit report, human factors engineering control room design review: Saint Lucie Nuclear Power Plant, Unit No. 2

    International Nuclear Information System (INIS)

    Peterson, L.R.; Lappa, D.A.; Moore, J.W.

    1981-01-01

    A human factors engineering preliminary design review of the Saint Lucie Unit 2 control room was performed at the site on August 3 through August 7, 1981. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. This report was prepared on the basis of the HFEB's review of the applicant's Preliminary Design Assessment and the human factors engineering design review/audit performed at the site. The review team included human factors consultants from BioTechnology, Inc., Falls Church, Virginia, and from Lawrence Livermore National Laboratory (University of California), Livermore, California

  10. Tissue engineering and surgery: from translational studies to human trials

    Directory of Open Access Journals (Sweden)

    Vranckx Jan Jeroen

    2017-06-01

    Full Text Available Tissue engineering was introduced as an innovative and promising field in the mid-1980s. The capacity of cells to migrate and proliferate in growth-inducing medium induced great expectancies on generating custom-shaped bioconstructs for tissue regeneration. Tissue engineering represents a unique multidisciplinary translational forum where the principles of biomaterial engineering, the molecular biology of cells and genes, and the clinical sciences of reconstruction would interact intensively through the combined efforts of scientists, engineers, and clinicians. The anticipated possibilities of cell engineering, matrix development, and growth factor therapies are extensive and would largely expand our clinical reconstructive armamentarium. Application of proangiogenic proteins may stimulate wound repair, restore avascular wound beds, or reverse hypoxia in flaps. Autologous cells procured from biopsies may generate an ‘autologous’ dermal and epidermal laminated cover on extensive burn wounds. Three-dimensional printing may generate ‘custom-made’ preshaped scaffolds – shaped as a nose, an ear, or a mandible – in which these cells can be seeded. The paucity of optimal donor tissues may be solved with off-the-shelf tissues using tissue engineering strategies. However, despite the expectations, the speed of translation of in vitro tissue engineering sciences into clinical reality is very slow due to the intrinsic complexity of human tissues. This review focuses on the transition from translational protocols towards current clinical applications of tissue engineering strategies in surgery.

  11. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  12. Human Engineering of Space Vehicle Displays and Controls

    Science.gov (United States)

    Whitmore, Mihriban; Holden, Kritina L.; Boyer, Jennifer; Stephens, John-Paul; Ezer, Neta; Sandor, Aniko

    2010-01-01

    Proper attention to the integration of the human needs in the vehicle displays and controls design process creates a safe and productive environment for crew. Although this integration is critical for all phases of flight, for crew interfaces that are used during dynamic phases (e.g., ascent and entry), the integration is particularly important because of demanding environmental conditions. This panel addresses the process of how human engineering involvement ensures that human-system integration occurs early in the design and development process and continues throughout the lifecycle of a vehicle. This process includes the development of requirements and quantitative metrics to measure design success, research on fundamental design questions, human-in-the-loop evaluations, and iterative design. Processes and results from research on displays and controls; the creation and validation of usability, workload, and consistency metrics; and the design and evaluation of crew interfaces for NASA's Crew Exploration Vehicle are used as case studies.

  13. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  14. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization.

    Science.gov (United States)

    Gladden, Matthew E

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

  15. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  16. Tissue-engineered human bioartificial muscles expressing a foreign recombinant protein for gene therapy

    Science.gov (United States)

    Powell, C.; Shansky, J.; Del Tatto, M.; Forman, D. E.; Hennessey, J.; Sullivan, K.; Zielinski, B. A.; Vandenburgh, H. H.

    1999-01-01

    Murine skeletal muscle cells transduced with foreign genes and tissue engineered in vitro into bioartificial muscles (BAMs) are capable of long-term delivery of soluble growth factors when implanted into syngeneic mice (Vandenburgh et al., 1996b). With the goal of developing a therapeutic cell-based protein delivery system for humans, similar genetic tissue-engineering techniques were designed for human skeletal muscle stem cells. Stem cell myoblasts were isolated, cloned, and expanded in vitro from biopsied healthy adult (mean age, 42 +/- 2 years), and elderly congestive heart failure patient (mean age, 76 +/- 1 years) skeletal muscle. Total cell yield varied widely between biopsies (50 to 672 per 100 mg of tissue, N = 10), but was not significantly different between the two patient groups. Percent myoblasts per biopsy (73 +/- 6%), number of myoblast doublings prior to senescence in vitro (37 +/- 2), and myoblast doubling time (27 +/- 1 hr) were also not significantly different between the two patient groups. Fusion kinetics of the myoblasts were similar for the two groups after 20-22 doublings (74 +/- 2% myoblast fusion) when the biopsy samples had been expanded to 1 to 2 billion muscle cells, a number acceptable for human gene therapy use. The myoblasts from the two groups could be equally transduced ex vivo with replication-deficient retroviral expression vectors to secrete 0.5 to 2 microg of a foreign protein (recombinant human growth hormone, rhGH)/10(6) cells/day, and tissue engineered into human BAMs containing parallel arrays of differentiated, postmitotic myofibers. This work suggests that autologous human skeletal myoblasts from a potential patient population can be isolated, genetically modified to secrete foreign proteins, and tissue engineered into implantable living protein secretory devices for therapeutic use.

  17. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  18. Analysis on nuclear power plant control room system design and improvement based on human factor engineering

    International Nuclear Information System (INIS)

    Gao Feng; Liu Yanzi; Sun Yongbin

    2014-01-01

    The design of nuclear power plant control room system is a process of improvement with the implementation of human factor engineering theory and guidance. The method of implementation human factor engineering principles into the nuclear power plant control room system design and improvement was discussed in this paper. It is recommended that comprehensive address should be done from control room system function, human machine interface, digital procedure, control room layout and environment design based on the human factor engineering theory and experience. The main issues which should be paid more attention during the control room system design and improvement also were addressed in this paper, and then advices and notices for the design and improvement of the nuclear power plant control room system were afforded. (authors)

  19. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  20. The experimental study of genetic engineering human neural stem cells mediated by lentivirus to express multigene.

    Science.gov (United States)

    Cai, Pei-qiang; Tang, Xun; Lin, Yue-qiu; Martin, Oudega; Sun, Guang-yun; Xu, Lin; Yang, Yun-kang; Zhou, Tian-hua

    2006-02-01

    To explore the feasibility to construct genetic engineering human neural stem cells (hNSCs) mediated by lentivirus to express multigene in order to provide a graft source for further studies of spinal cord injury (SCI). Human neural stem cells from the brain cortex of human abortus were isolated and cultured, then gene was modified by lentivirus to express both green fluorescence protein (GFP) and rat neurotrophin-3 (NT-3); the transgenic expression was detected by the methods of fluorescence microscope, dorsal root ganglion of fetal rats and slot blot. Genetic engineering hNSCs were successfully constructed. All of the genetic engineering hNSCs which expressed bright green fluorescence were observed under the fluorescence microscope. The conditioned medium of transgenic hNSCs could induce neurite flourishing outgrowth from dorsal root ganglion (DRG). The genetic engineering hNSCs expressed high level NT-3 which could be detected by using slot blot. Genetic engineering hNSCs mediated by lentivirus can be constructed to express multigene successfully.

  1. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  2. Human Systems Engineering for Launch processing at Kennedy Space Center (KSC)

    Science.gov (United States)

    Henderson, Gena; Stambolian, Damon B.; Stelges, Katrine

    2012-01-01

    Launch processing at Kennedy Space Center (KSC) is primarily accomplished by human users of expensive and specialized equipment. In order to reduce the likelihood of human error, to reduce personal injuries, damage to hardware, and loss of mission the design process for the hardware needs to include the human's relationship with the hardware. Just as there is electrical, mechanical, and fluids, the human aspect is just as important. The focus of this presentation is to illustrate how KSC accomplishes the inclusion of the human aspect in the design using human centered hardware modeling and engineering. The presentations also explain the current and future plans for research and development for improving our human factors analysis tools and processes.

  3. Keeping electronic records secure.

    Science.gov (United States)

    Easton, David

    2013-10-01

    Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.

  4. Pengalokasian Tenaga Kerja dengan Human Factor Engineering di PT. Pelindo I

    Directory of Open Access Journals (Sweden)

    Yusnawati Yusnawati

    2017-05-01

    Full Text Available Indonesia Port Corporation I (PT Pelabuhan Indonesia I (Persero or PT. Pelindo I is one of the Indonesian state-owned enterprises which manages port services in western Indonesia. Shipyard unit (Unit Galangan Kapal (UGK is a branch of PT. Pelindo I. At present, a problem arises if more than 2 ships are being repaired at once in the unit, UGK scheduling overlaps the repairing activities. In order to solve the problem, study of human factor is important. Human factor is the study of the limitations, capabilities, and human behavior, as well as its interaction with the product, environment, equipment and the establishment of tasks and activities. One part of the human factor is the human factor in system design. In order to improve the effectiveness of the system, the human factor must be involved in each phase of the design process in the system design. This includes a number of activities to obtain input specification work, therefore the working methods and the optimal amount of labor can be determined. Human factors engineering is the application of science that utilizes research on the human factor and use the basic knowledge to design, to repair and to install the system. This research method is causal, searching for the causes which led to delays in the completion of ship repairing. Through human factor engineering approach to the allocation of labor increased by 12.23 per cent of the actual conditions, so that the delay of ship repair were not found during normal conditions.

  5. A dual-mode secure UHF RFID tag with a crypto engine in 0.13-μm CMOS

    Science.gov (United States)

    Tao, Yang; Linghao, Zhu; Xi, Tan; Junyu, Wang; Lirong, Zheng; Hao, Min

    2016-07-01

    An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. Project supported by the National Science & Technology Pillar Program of China (No. 2015BAK36B01).

  6. Synthetic Biology Approaches to Engineer Probiotics and Members of the Human Microbiota for Biomedical Applications.

    Science.gov (United States)

    Bober, Josef R; Beisel, Chase L; Nair, Nikhil U

    2018-03-12

    An increasing number of studies have strongly correlated the composition of the human microbiota with many human health conditions and, in several cases, have shown that manipulating the microbiota directly affects health. These insights have generated significant interest in engineering indigenous microbiota community members and nonresident probiotic bacteria as biotic diagnostics and therapeutics that can probe and improve human health. In this review, we discuss recent advances in synthetic biology to engineer commensal and probiotic lactic acid bacteria, bifidobacteria, and Bacteroides for these purposes, and we provide our perspective on the future potential of these technologies. 277 Expected final online publication date for the Annual Review of Biomedical Engineering Volume 20 is June 4, 2018. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.

  7. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    Science.gov (United States)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  8. Safety review for human factors engineering and control rooms of nuclear power plants

    International Nuclear Information System (INIS)

    Yang Mengzhuo

    1998-01-01

    Safety review for human factors engineering and control rooms of nuclear power plants (NPP) is in a forward position of science and technology, which began at American TMI severe accident and had been implemented in China. The importance and the significance of the safety review are expounded, the requirements of its scope and profundity are explained in detail. In addition, the situation of the technical document system for nuclear safety regulation on human factors engineering and control rooms of NPP in China is introduced briefly, on which the safety review is based

  9. Medical Engineering and Microneurosurgery: Application and Future.

    Science.gov (United States)

    Morita, Akio; Sora, Shigeo; Nakatomi, Hirofumi; Harada, Kanako; Sugita, Naohiko; Saito, Nobuhito; Mitsuishi, Mamoru

    2016-10-15

    Robotics and medical engineering can convert traditional surgery into digital and scientific procedures. Here, we describe our work to develop microsurgical robotic systems and apply engineering technology to assess microsurgical skills. With the collaboration of neurosurgeons and an engineering team, we have developed two types of microsurgical robotic systems. The first, the deep surgical systems, enable delicate surgical procedures such as vessel suturing in a deep and narrow space. The second type allows for super-fine surgical procedures such as anastomosing artificial vessels of 0.3 mm in diameter. Both systems are constructed with master and slave manipulator robots connected to local area networks. Robotic systems allowed for secure and accurate procedures in a deep surgical field. In cadaveric models, these systems showed a good potential of being useful in actual human surgeries, but mechanical refinements in thickness and durability are necessary for them to be established as clinical systems. The super-fine robotic system made the very intricate surgery possible and will be applied in clinical trials. Another trial included the digitization of surgical technique and scientific analysis of surgical skills. Robotic and human hand motions were analyzed in numerical fashion as we tried to define surgical skillfulness in a digital format. Engineered skill assessment is also feasible and should be useful for microsurgical training. Robotics and medical engineering should bring science into the surgical field and training of surgeons. Active collaboration between medical and engineering teams and academic and industry groups is mandatory to establish such medical systems to improve patient care.

  10. Definition of Nuclear Material in Aspects of Nuclear Nonproliferation and Security

    International Nuclear Information System (INIS)

    Jeon, Ji Hye; Lee, Chan Suh

    2014-01-01

    Nuclear safety accidents directly affect human health but nuclear security incidents indirectly influence human, which demonstrates the reason why security receives less attention. However, it is acknowledged that nuclear terrorism is indeed one of the most dreadful threat humanity faces. As part of strengthening nuclear security as well as nonproliferation to response to the threat, we need a better understanding of the nuclear material which needs to be safe under the objective of nuclear security. In reality, practitioners implement safeguards and physical protection in compliance with the regulation text in domestic legislation. Thus, it is important to specify nuclear material clearly in law for effective implementation. Therefore, the definition of terminology related to nuclear material is explored herein, within the highest-level legislation on the safeguards and physical protection. First the definition in Korean legislation is analyzed. Then, so as to suggest some improvements, other international efforts are examined and some case studies are conducted on other states which have similar level of nuclear technology and industry to Korea. Finally, a draft of definition on nuclear material in perspective of nuclear nonproliferation and security is suggested based on the analysis below. The recommendation showed the draft nuclear material definition in nuclear control. The text will facilitate the understanding of nuclear material in the context of nuclear nonproliferation and security. It might provide appropriate provision for future legislation related to nuclear nonproliferation and security. For effective safeguards and physical protection measures, nuclear material should be presented with in a consistent manner as shown in the case of United Kingdom. It will be much more helpful if further material engineering studies on each nuclear material are produced. Multi-dimensional approach is required for the studies on the degree of efforts to divert

  11. Definition of Nuclear Material in Aspects of Nuclear Nonproliferation and Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Ji Hye; Lee, Chan Suh [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-10-15

    Nuclear safety accidents directly affect human health but nuclear security incidents indirectly influence human, which demonstrates the reason why security receives less attention. However, it is acknowledged that nuclear terrorism is indeed one of the most dreadful threat humanity faces. As part of strengthening nuclear security as well as nonproliferation to response to the threat, we need a better understanding of the nuclear material which needs to be safe under the objective of nuclear security. In reality, practitioners implement safeguards and physical protection in compliance with the regulation text in domestic legislation. Thus, it is important to specify nuclear material clearly in law for effective implementation. Therefore, the definition of terminology related to nuclear material is explored herein, within the highest-level legislation on the safeguards and physical protection. First the definition in Korean legislation is analyzed. Then, so as to suggest some improvements, other international efforts are examined and some case studies are conducted on other states which have similar level of nuclear technology and industry to Korea. Finally, a draft of definition on nuclear material in perspective of nuclear nonproliferation and security is suggested based on the analysis below. The recommendation showed the draft nuclear material definition in nuclear control. The text will facilitate the understanding of nuclear material in the context of nuclear nonproliferation and security. It might provide appropriate provision for future legislation related to nuclear nonproliferation and security. For effective safeguards and physical protection measures, nuclear material should be presented with in a consistent manner as shown in the case of United Kingdom. It will be much more helpful if further material engineering studies on each nuclear material are produced. Multi-dimensional approach is required for the studies on the degree of efforts to divert

  12. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  13. Teaching Information Security Students to "Think thief"

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne

    2012-01-01

    We report on an educational experiment where information security master students were encouraged to think out of the box. Instead of taking the usual point of view of the security engineer we challenged the students to take the point of view of the motivated offender. We report on the exciting

  14. Unifying Human Centered Design and Systems Engineering for Human Systems Integration

    Science.gov (United States)

    Boy, Guy A.; McGovernNarkevicius, Jennifer

    2013-01-01

    Despite the holistic approach of systems engineering (SE), systems still fail, and sometimes spectacularly. Requirements, solutions and the world constantly evolve and are very difficult to keep current. SE requires more flexibility and new approaches to SE have to be developed to include creativity as an integral part and where the functions of people and technology are appropriately allocated within our highly interconnected complex organizations. Instead of disregarding complexity because it is too difficult to handle, we should take advantage of it, discovering behavioral attractors and the emerging properties that it generates. Human-centered design (HCD) provides the creativity factor that SE lacks. It promotes modeling and simulation from the early stages of design and throughout the life cycle of a product. Unifying HCD and SE will shape appropriate human-systems integration (HSI) and produce successful systems.

  15. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  16. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  17. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  18. Progress of teaching and learning of nuclear engineering courses at College of Engineering, Universiti Tenaga Nasional (UNITEN)

    Science.gov (United States)

    Hamid, Nasri A.; Mohamed, Abdul Aziz; Yusoff, Mohd. Zamri

    2015-04-01

    Developing human capital in nuclear with required nuclear background and professional qualifications is necessary to support the implementation of nuclear power projects in the near future. Sufficient educational and training skills are required to ensure that the human resources needed by the nuclear power industry meets its high standard. The Government of Malaysia has made the decision to include nuclear as one of the electricity generation option for the country, post 2020 in order to cater for the increasing energy demands of the country as well as to reduce CO2 emission. The commitment by the government has been made clearer with the inclusion of the development of first NPP by 2021 in the Economic Transformation Program (ETP) which was launched by the government in October 2010. The In tandem with the government initiative to promote nuclear energy, Center for Nuclear Energy, College of Engineering, Universiti Tenaga Nasional (UNITEN) is taking the responsibility in developing human capital in the area of nuclear power and technology. In the beginning, the College of Engineering has offered the Introduction to Nuclear Technology course as a technical elective course for all undergraduate engineering students. Gradually, other nuclear technical elective courses are offered such as Nuclear Policy, Security and Safeguards, Introduction to Nuclear Engineering, Radiation Detection and Nuclear Instrumentation, Introduction to Reactor Physics, Radiation Safety and Waste Management, and Nuclear Thermal-hydraulics. In addition, another course Advancement in Nuclear Energy is offered as one of the postgraduate elective courses. To enhance the capability of teaching staffs in nuclear areas at UNITEN, several junior lecturers are sent to pursue their postgraduate studies in the Republic of Korea, United States and the United Kingdom, while the others are participating in short courses and workshops in nuclear that are conducted locally and abroad. This paper describes

  19. Progress of teaching and learning of nuclear engineering courses at College of Engineering, Universiti Tenaga Nasional (UNITEN)

    International Nuclear Information System (INIS)

    Hamid, Nasri A.; Mohamed, Abdul Aziz; Yusoff, Mohd. Zamri

    2015-01-01

    Developing human capital in nuclear with required nuclear background and professional qualifications is necessary to support the implementation of nuclear power projects in the near future. Sufficient educational and training skills are required to ensure that the human resources needed by the nuclear power industry meets its high standard. The Government of Malaysia has made the decision to include nuclear as one of the electricity generation option for the country, post 2020 in order to cater for the increasing energy demands of the country as well as to reduce CO 2 emission. The commitment by the government has been made clearer with the inclusion of the development of first NPP by 2021 in the Economic Transformation Program (ETP) which was launched by the government in October 2010. The In tandem with the government initiative to promote nuclear energy, Center for Nuclear Energy, College of Engineering, Universiti Tenaga Nasional (UNITEN) is taking the responsibility in developing human capital in the area of nuclear power and technology. In the beginning, the College of Engineering has offered the Introduction to Nuclear Technology course as a technical elective course for all undergraduate engineering students. Gradually, other nuclear technical elective courses are offered such as Nuclear Policy, Security and Safeguards, Introduction to Nuclear Engineering, Radiation Detection and Nuclear Instrumentation, Introduction to Reactor Physics, Radiation Safety and Waste Management, and Nuclear Thermal-hydraulics. In addition, another course Advancement in Nuclear Energy is offered as one of the postgraduate elective courses. To enhance the capability of teaching staffs in nuclear areas at UNITEN, several junior lecturers are sent to pursue their postgraduate studies in the Republic of Korea, United States and the United Kingdom, while the others are participating in short courses and workshops in nuclear that are conducted locally and abroad. This paper describes

  20. Progress of teaching and learning of nuclear engineering courses at College of Engineering, Universiti Tenaga Nasional (UNITEN)

    Energy Technology Data Exchange (ETDEWEB)

    Hamid, Nasri A., E-mail: Nasri@uniten.edu.my; Mohamed, Abdul Aziz; Yusoff, Mohd. Zamri [Nuclear Energy Center, College of Engineering, Universiti Tenaga Nasional, Jalan IKRAM-UNITEN, 43000 Kajang, Selangor (Malaysia)

    2015-04-29

    Developing human capital in nuclear with required nuclear background and professional qualifications is necessary to support the implementation of nuclear power projects in the near future. Sufficient educational and training skills are required to ensure that the human resources needed by the nuclear power industry meets its high standard. The Government of Malaysia has made the decision to include nuclear as one of the electricity generation option for the country, post 2020 in order to cater for the increasing energy demands of the country as well as to reduce CO{sub 2} emission. The commitment by the government has been made clearer with the inclusion of the development of first NPP by 2021 in the Economic Transformation Program (ETP) which was launched by the government in October 2010. The In tandem with the government initiative to promote nuclear energy, Center for Nuclear Energy, College of Engineering, Universiti Tenaga Nasional (UNITEN) is taking the responsibility in developing human capital in the area of nuclear power and technology. In the beginning, the College of Engineering has offered the Introduction to Nuclear Technology course as a technical elective course for all undergraduate engineering students. Gradually, other nuclear technical elective courses are offered such as Nuclear Policy, Security and Safeguards, Introduction to Nuclear Engineering, Radiation Detection and Nuclear Instrumentation, Introduction to Reactor Physics, Radiation Safety and Waste Management, and Nuclear Thermal-hydraulics. In addition, another course Advancement in Nuclear Energy is offered as one of the postgraduate elective courses. To enhance the capability of teaching staffs in nuclear areas at UNITEN, several junior lecturers are sent to pursue their postgraduate studies in the Republic of Korea, United States and the United Kingdom, while the others are participating in short courses and workshops in nuclear that are conducted locally and abroad. This paper

  1. Control room human engineering influences on operator performance

    International Nuclear Information System (INIS)

    Finlayson, F.C.

    1977-01-01

    Three general groups of factors influence operator performance in fulfilling their responsibilities in the control room: (1) control room and control system design, informational data displays (operator inputs) as well as control board design (for operator output); (2) operator characteristics, including those skills, mental, physical, and emotional qualities which are functions of operator selection, training, and motivation; (3) job performance guides, the prescribed operating procedures for normal and emergency operations. This paper presents some of the major results of an evaluation of the effect of human engineering on operator performance in the control room. Primary attention is given to discussion of control room and control system design influence on the operator. Brief observations on the influences of operator characteristics and job performance guides (operating procedures) on performance in the control room are also given. Under the objectives of the study, special emphasis was placed on the evaluation of the control room-operator relationships for severe emergency conditions in the power plant. Consequently, this presentation is restricted largely to material related to emergency conditions in the control room, though it is recognized that human engineering of control systems is of equal (or greater) importance for many other aspects of plant operation

  2. Towards breaking the silence between the two cultures: Engineering and the other humanities

    Energy Technology Data Exchange (ETDEWEB)

    Prausnitz, John M.

    2003-01-01

    Over the years, I have attended numerous meetings like this one at the Center for the Study of Higher Education. I have noticed that most of the attendees, and certainly the speakers, tend to come from the social sciences or humanities. Only rarely do I see anyone here from Berkeley's College of Chemistry or College of Engineering. I come from the College of Chemistry that includes Berkeley's Department of Chemical Engineering. I mention this background to indicate that my remarks here are necessarily less abstract, less theoretical and less philosophical than those of most previous seminar speakers. My remarks are probably somewhat simplistic because, as a result of my engineering background, I tend to focus less on generalities and principles, giving more attention to possible solutions of limited practical problems. About seven weeks ago, I was invited to attend a conference sponsored by the Berlin Academy of Sciences where ''Sciences'' is not confined to natural sciences but includes also humanities and social sciences. The topic of the Conference was ''Sprachlosigkeit'', a German word that roughly translated means inability to speak. The subtitle was ''Silence Between the Disciplines''. The German universities are worried about the increasing gulf between what is often called ''the two cultures''. This gulf is a problem everywhere, including Berkeley, but it is my impression that it is much worse in Europe than in America. The International Conference in Berlin was attended by some big names including the presidents of the Humboldt University in Berlin, the University of Uppsala in Sweden and the Central European University of Budapest, as well as some distinguished academics from a variety of institutions including Harvard and Stanford, and the presidents of three major funding organizations: The Volkswagen Foundation, The German National Science Foundation and the Max

  3. Tools for Developing a Quality Management Program: Human Factors and Systems Engineering Tools

    International Nuclear Information System (INIS)

    Caldwell, Barrett S.

    2008-01-01

    During the past 10 years, there has been growing acceptance and encouragement of partnerships between medical teams and engineers. Using human factors and systems engineering descriptions of process flows and operational sequences, the author's research laboratory has helped highlight opportunities for reducing adverse events and improving performance in health care and other high-consequence environments. This research emphasized studying human behavior that enhances system performance and a range of factors affecting adverse events, rather than a sole emphasis on human error causation. Developing a balanced evaluation requires novel approaches to causal analyses of adverse events and, more importantly, methods of recovery from adverse conditions. Recent work by the author's laboratory in collaboration with the Regenstrief Center for Healthcare Engineering has started to address possible improvements in taxonomies describing health care tasks. One major finding includes enhanced understanding of events and how event dynamics influence provider tasks and constraints. Another element of this research examines team coordination tasks that strongly affect patient care and quality management, but may be undervalued as 'indirect patient care' activities

  4. Software To Secure Distributed Propulsion Simulations

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  5. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  6. Human factors engineering checklists for application in the SAR process

    International Nuclear Information System (INIS)

    Overlin, T.K.; Romero, H.A.; Ryan, T.G.

    1995-03-01

    This technical report was produced to assist the preparers and reviewers of the human factors portions of the SAR in completing their assigned tasks regarding analysis and/or review of completed analyses. The checklists, which are the main body of the report, and the subsequent tables, were developed to assist analysts in generating the needed analysis data to complete the human engineering analysis for the SAR. The technical report provides a series of 19 human factors engineering (HFE) checklists which support the safety analyses of the US Department of Energy's (DOE) reactor and nonreactor facilities and activities. The results generated using these checklists and in the preparation of the concluding analyses provide the technical basis for preparing the human factors chapter, and subsequent inputs to other chapters, required by DOE as a part of the safety analysis reports (SARs). This document is divided into four main sections. The first part explains the origin of the checklists, the sources utilized, and other information pertaining to the purpose and scope of the report. The second part, subdivided into 19 sections, is the checklists themselves. The third section is the glossary which defines terms that could either be unfamiliar or have specific meanings within the context of these checklists. The final section is the subject index in which the glossary terms are referenced back to the specific checklist and page the term is encountered

  7. Advancing biomaterials of human origin for tissue engineering

    OpenAIRE

    Chen, Fa-Ming; Liu, Xiaohua

    2015-01-01

    Biomaterials have played an increasingly prominent role in the success of biomedical devices and in the development of tissue engineering, which seeks to unlock the regenerative potential innate to human tissues/organs in a state of deterioration and to restore or reestablish normal bodily function. Advances in our understanding of regenerative biomaterials and their roles in new tissue formation can potentially open a new frontier in the fast-growing field of regenerative medicine. Taking in...

  8. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings

    International Nuclear Information System (INIS)

    GARVIN, L.J.

    1999-01-01

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report. Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553, Annex A, Chapter A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports

  9. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB): Results and Findings

    International Nuclear Information System (INIS)

    GARVIN, L.J.

    1999-01-01

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports

  10. THE RESPONSIBILITY OF PROTECTING (R2P HUMAN RIGHTS AND SECURITY COUNCIL

    Directory of Open Access Journals (Sweden)

    ULDARICIO FIGUEROA PLÁ

    2017-12-01

    Full Text Available The adoption in 1948 of the Convention on the Prevention and Punishment of the Crime of Genocide seemed to open a new era in the international scenario in which these kind of practices apparently are left in the historic past. Reality has shown us that this international instrument was not enough to face arbitrary measures of some Governments. Nevertheless, genocide actions continuing to be performed, and in order to decrease human suffering, “humanitarian intervention” was thought as a response to the ineffectiveness of the Security Council which also brought along arbitrary actions in its invocation, discrediting it. Before the reiterated calls of the Secretary General of the United Nations to prevent and detain massive violations to human rights, an effort has been made in order to standardizing a type of interventions that can respond to massive violations of human rights. This has been called Responsibility to Protect.

  11. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  12. Cyber security best practices for the nuclear industry

    International Nuclear Information System (INIS)

    Badr, I.

    2012-01-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  13. Cyber security best practices for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  14. Engineering Education Development to Enhance Human Skill in DENSO

    Science.gov (United States)

    Isogai, Emiko; Nuka, Takeji

    Importance of human skills such as communication or instruction capability to their staff members has recently been highlighted in a workplace, due to decreasing opportunity of face-to-face communication between supervisors and their staff, or Instruction capability through OJT (On the Job Training) . Currently, communication skills are being reinforced mainly through OJT at DENSO. Therefore, as part of supplemental support tools, DENSO has established comprehensive engineers training program on off-JT basis for developing human skills, covering from newly employeed enginners up to managerial class since 2003. This paper describes education activities and reports the results.

  15. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering

  16. Human Factors Engineering: Current Practices and Development Needs in Finland

    Energy Technology Data Exchange (ETDEWEB)

    Savioja, Paula; Norros, Leena; Liinasuo, Marja; Laarni, Jari [VTT Technical Research Centre of Finland, Finland (Finland)

    2011-08-15

    This paper describes initial findings from a study concerning the practices and development needs of Human Factors Engineering (HFE) in Finland. HFE is increasing in importance as the Radiation and Nuclear Safety Authority Finland (STUK) is renewing the regulatory guidelines and the intention is to include requirements concerning HFE. The motivation for the paper is to discover how HFE is conducted currently in order to envision what should be aimed at when modifying requirements for design practices. In an interview with STUK it was discovered that current HFE practices encompass mainly activities related to control room modifications and as such namely verification and validation of new designs. The adoption of the entire HFE process in design and modification projects requires changes that include better integration of technical and Human Factors Engineering approaches. Boundary objects that mediate between different design disciplines are needed in order to enforce the stronger integration. Concept of operations (CONOPS) is suggested as a such boundary object.

  17. Securities issues in reserves reporting

    International Nuclear Information System (INIS)

    Legg, M.B.

    1997-01-01

    Securities issues in oil and gas reserves reporting were discussed. Alberta requires specific information regarding important oil and gas properties, plants, facilities and installations. When preparing the reserves report, the following elements are important to consider: (1) the author of the report must be a registered professional engineer or registered professional geologist, (2) the report itself must be an engineering document, (3) the content of the report must be extensive, (4) it should be prepared in accordance with petroleum engineering and evaluation practices, and must include a summary of estimated net reserves

  18. 2015 Space Human Factors Engineering Standing Review Panel

    Science.gov (United States)

    Steinberg, Susan

    2015-01-01

    The 2015 Space Human Factors Engineering (SHFE) Standing Review Panel (from here on referred to as the SRP) met for a site visit in Houston, TX on December 2 - 3, 2015. The SRP reviewed the updated research plans for the Risk of Inadequate Design of Human and Automation/Robotic Integration (HARI Risk), the Risk of Inadequate Human-Computer Interaction (HCI Risk), and the Risk of Inadequate Mission, Process and Task Design (MPTask Risk). The SRP also received a status update on the Risk of Incompatible Vehicle/Habitat Design (Hab Risk) and the Risk of Performance Errors Due to Training Deficiencies (Train Risk). The SRP is pleased with the progress and responsiveness of the SHFE team. The presentations were much improved this year. The SRP is also pleased with the human-centered design approach. Below are some of the more extensive comments from the SRP. We have also made comments in each section concerning gaps/tasks in each. The comments below reflect more significant changes that impact more than just one particular section.

  19. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  20. A systems engineering perspective on the human-centered design of health information systems.

    Science.gov (United States)

    Samaras, George M; Horst, Richard L

    2005-02-01

    The discipline of systems engineering, over the past five decades, has used a structured systematic approach to managing the "cradle to grave" development of products and processes. While elements of this approach are typically used to guide the development of information systems that instantiate a significant user interface, it appears to be rare for the entire process to be implemented. In fact, a number of authors have put forth development lifecycle models that are subsets of the classical systems engineering method, but fail to include steps such as incremental hazard analysis and post-deployment corrective and preventative actions. In that most health information systems have safety implications, we argue that the design and development of such systems would benefit by implementing this systems engineering approach in full. Particularly with regard to bringing a human-centered perspective to the formulation of system requirements and the configuration of effective user interfaces, this classical systems engineering method provides an excellent framework for incorporating human factors (ergonomics) knowledge and integrating ergonomists in the interdisciplinary development of health information systems.

  1. Genetic Engineering and Human Mental Ecology: Interlocking Effects and Educational Considerations

    OpenAIRE

    Affifi, Ramsey

    2017-01-01

    This paper describes some likely semiotic consequences of genetic engineering on what Gregory Bateson has called ?the mental ecology? (1979) of future humans, consequences that are less often raised in discussions surrounding the safety of GMOs (genetically modified organisms). The effects are as follows: an increased 1) habituation to the presence of GMOs in the environment, 2) normalization of empirically false assumptions grounding genetic reductionism, 3) acceptance that humans are capabl...

  2. Geothermal reservoir engineering

    CERN Document Server

    Grant, Malcolm Alister

    2011-01-01

    As nations alike struggle to diversify and secure their power portfolios, geothermal energy, the essentially limitless heat emanating from the earth itself, is being harnessed at an unprecedented rate.  For the last 25 years, engineers around the world tasked with taming this raw power have used Geothermal Reservoir Engineering as both a training manual and a professional reference.  This long-awaited second edition of Geothermal Reservoir Engineering is a practical guide to the issues and tasks geothermal engineers encounter in the course of their daily jobs. The bo

  3. Security electronics circuits manual

    CERN Document Server

    MARSTON, R M

    1998-01-01

    Security Electronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. It will also prove to be a useful guide for students and experimenters, as well as providing experienced amateurs and DIY enthusiasts with numerous ideas to protect their homes, businesses and properties.As with all Ray Marston's Circuits Manuals, the style is easy-to-read and non-mathematical, with the emphasis firmly on practical applications, circuits and design ideas. The ICs and other devices used in the practical circuits are modestly priced and readily available ty

  4. Human factors in remote control engineering development activities

    International Nuclear Information System (INIS)

    Clarke, M.M.; Hamel, W.R.; Draper, J.V.

    1983-01-01

    Human factors engineering, which is an integral part of the advanced remote control development activities at the Oak Ridge National Laboratory, is described. First, work at the Remote Systems Development Facility (RSDF) has shown that operators can perform a wide variety of tasks, some of which were not specifically designed for remote systems, with a dextrous electronic force-reflecting servomanipulator and good television remote viewing capabilities. Second, the data collected during mock-up remote maintenance experiments at the RSDF have been analyzed to provide guidelines for the design of human interfaces with an integrated advanced remote maintenance system currently under development. Guidelines have been provided for task allocation between operators, remote viewing systems, and operator controls. 6 references, 5 figures, 2 tables

  5. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  6. Engineering and Humanities Students' Strategies for Vocabulary Acquisition: An Iranian Experience

    Directory of Open Access Journals (Sweden)

    Hassan Soodmand Afshar

    2014-05-01

    Full Text Available The present study set out to investigate the differences between EAP (English for Academic Purposes students of Humanities and Engineering in terms of vocabulary strategy choice and use. One hundred and five undergraduate Iranian students (39 students from Engineering Faculty and 66 from Humanities Faculty studying at Bu-Ali Sina University Hamedan, during the academic year of 2011–2012 participated in this study. For data collection purposes, a pilot-tested factor-analyzed five-point Likert-scale vocabulary learning strategies questionnaire (VLSQ containing 45 statements was adopted. The results of independent samples t-test indicated that, overall, the two groups were not significantly different in the choice and use of vocabulary learning strategies. However, running Chi square analyses, significant differences were found in individual strategy use in 6 out of 45 strategies. That is, while Humanities students used more superficial and straightforward strategies like repetition strategy and seeking help from others, the Engineering students preferred much deeper, thought-provoking and sophisticated strategies like using a monolingual dictionary and learning vocabulary through collocations and coordinates. Further, the most and the least frequently used vocabulary learning strategies by the two groups were specified, out of which only two strategies in each category were commonly shared by both groups. The possible reasons why the results have turned out to be so as well as the implications of the study are discussed in details in the paper.

  7. EDF EPR project: operating principles validation and human factor engineering program

    International Nuclear Information System (INIS)

    Lefebvre, B.; Berard, E.; Arpino, J.-M.

    2005-01-01

    This article describes the specificities of the operating principles chosen by EDF for the EPR project as a result of an extensive Human Factor Engineering program successfully implemented in an industrial project context. The design process and its achievements benefit of the EDF experience feedback not only in term of NPP operation - including the fully computerized control room of the N4-serie - but also in term of NPP designer. The elements exposed hereafter correspond to the basic design phase of EPR HMI which has been completed and successfully validated by the end of 2003. The article aims to remind the context of the project which basically consists in designing a modern and efficient HMI taking into account the operating needs while relying on proven and reliable technologies. The Human Factor Engineering program implemented merges these both aspects by : 1) being fully integrated within the project activities and scheduling; 2) efficiently taking into account the users needs as well as the feasibility constraints by relying on a multidisciplinary design team including HF specialists, I and C specialists, Process specialists and experienced operator representatives. The resulting design process makes a wide use of experience feedback and experienced operator knowledge to complete largely the existing standards for providing a fully useable and successful design method in an industrial context. The article underlines the design process highlights that largely contribute to the successful implementation of a Human Factor Engineering program for EPR. (authors)

  8. Human factors engineering in nuclear plant rehabilitations

    International Nuclear Information System (INIS)

    Bernston, K.; Remisz, M.; Malcolm, S.

    2001-01-01

    There are several unique considerations when creating and maintaining a human factors program for a plant refurbishment. These consideration arise from a variety of sources, including budget and time constraints on life extension projects, working to existing plant protocols and current acceptable HFE practices, and issues relating to function and task analysis. This results in a need to streamline and carefully time HFE practices from project start up to completion. In order to perform this task adequately, a comprehensive Human Factors Engineering Program Plan should be designed and tailored to the project. Systems of planning and prioritization are essential, and the required HFE designer training needs to be established. HFE specialists need to be aware of the existing plant constraints, and he prepared to work within them when providing support. The current paper discusses these aspects in the context of major refurbishment work at CANDU stations. (author)

  9. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  10. [Insights into engineering of cellulosic ethanol].

    Science.gov (United States)

    Yue, Guojun; Wu, Guoqing; Lin, Xin

    2014-06-01

    For energy security, air pollution concerns, coupled with the desire to sustain the agricultural sector and revitalize the rural economy, many countries have applied ethanol as oxygenate or fuel to supplement or replace gasoline in transportation sector. Because of abundant feedstock resources and effective reduction of green-house-gas emissions, the cellulosic ethanol has attracted great attention. With a couple of pioneers beginning to produce this biofuel from biomass in commercial quantities around the world, it is necessary to solve engineering problems and complete the economic assessment in 2015-2016, gradually enter the commercialization stage. To avoid "competing for food with humans and competing for land with food", the 1st generation fuel ethanol will gradually transit to the 2nd generation cellulosic ethanol. Based on the overview of cellulosic ethanol industrialization from domestic and abroad in recent years, the main engineering application problems encountered in pretreatment, enzymes and enzymatic hydrolysis, pentose/hexose co-fermentation strains and processes, equipment were discussed from chemical engineering and biotechnology perspective. The development direction of cellulosic ethanol technology in China was addressed.

  11. Engineering adolescence: maturation of human pluripotent stem cell-derived cardiomyocytes.

    Science.gov (United States)

    Yang, Xiulan; Pabon, Lil; Murry, Charles E

    2014-01-31

    The discovery of human pluripotent stem cells (hPSCs), including both human embryonic stem cells and human-induced pluripotent stem cells, has opened up novel paths for a wide range of scientific studies. The capability to direct the differentiation of hPSCs into functional cardiomyocytes has provided a platform for regenerative medicine, development, tissue engineering, disease modeling, and drug toxicity testing. Despite exciting progress, achieving the optimal benefits has been hampered by the immature nature of these cardiomyocytes. Cardiac maturation has long been studied in vivo using animal models; however, finding ways to mature hPSC cardiomyocytes is only in its initial stages. In this review, we discuss progress in promoting the maturation of the hPSC cardiomyocytes, in the context of our current knowledge of developmental cardiac maturation and in relation to in vitro model systems such as rodent ventricular myocytes. Promising approaches that have begun to be examined in hPSC cardiomyocytes include long-term culturing, 3-dimensional tissue engineering, mechanical loading, electric stimulation, modulation of substrate stiffness, and treatment with neurohormonal factors. Future studies will benefit from the combinatorial use of different approaches that more closely mimic nature's diverse cues, which may result in broader changes in structure, function, and therapeutic applicability.

  12. 7 CFR 1753.17 - Engineering services.

    Science.gov (United States)

    2010-01-01

    ... form. (B) The contract will not accomplish loan purposes. (C) The engineering service fees are unreasonable. (D) The contract presents unacceptable loan security risk to RUS. (E) The consulting engineering... loan shall be rendered by a qualified engineer selected by the borrower or by qualified employees on...

  13. Human factors engineering checklists for application in the SAR process

    Energy Technology Data Exchange (ETDEWEB)

    Overlin, T.K.; Romero, H.A.; Ryan, T.G.

    1995-03-01

    This technical report was produced to assist the preparers and reviewers of the human factors portions of the SAR in completing their assigned tasks regarding analysis and/or review of completed analyses. The checklists, which are the main body of the report, and the subsequent tables, were developed to assist analysts in generating the needed analysis data to complete the human engineering analysis for the SAR. The technical report provides a series of 19 human factors engineering (HFE) checklists which support the safety analyses of the US Department of Energy`s (DOE) reactor and nonreactor facilities and activities. The results generated using these checklists and in the preparation of the concluding analyses provide the technical basis for preparing the human factors chapter, and subsequent inputs to other chapters, required by DOE as a part of the safety analysis reports (SARs). This document is divided into four main sections. The first part explains the origin of the checklists, the sources utilized, and other information pertaining to the purpose and scope of the report. The second part, subdivided into 19 sections, is the checklists themselves. The third section is the glossary which defines terms that could either be unfamiliar or have specific meanings within the context of these checklists. The final section is the subject index in which the glossary terms are referenced back to the specific checklist and page the term is encountered.

  14. Optimizing the human engineering design of control panels in nuclear power plant control rooms

    International Nuclear Information System (INIS)

    Behrendt, V.; Krehbiehl, T.; Hartfiel, H.D.; Mannhaupt, H.R.

    1986-12-01

    The study contains two parts. In the first part an analytical procedure is developed to logically and reproducibly subdivide the control room personnel tasks resulting in a list of the elements (operations) and the structure (operations scheme) of a task. The second part lists together all knowledge of and influences on human engineering which are known at this time and which should be taken into account in designing control rooms. The content of this catalogue can best be used and presented by using a personal computer. Two fundamental different ways are possible to use the catalogue. Designing new control rooms or new parts of control rooms the results of the task analysis which should be done first, should guide the search in the catalogue to find the right human engineering factors. For assessing existing control room panels the performance shaping factors which are establishing the table of content, permit a quick access to the catalogue. Both the specific procedure of the task analysis and the different ways of access to the catalogue of human engineering knowledge for designing nuclear power plant control rooms have been proven by experienced system engineers and safety experts. The results are presented. They have been considered in this version of the study. (orig.) [de

  15. Aspect-oriented security hardening of UML design models

    CERN Document Server

    Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor

    2015-01-01

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The

  16. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings

    Energy Technology Data Exchange (ETDEWEB)

    GARVIN, L.J.

    1999-09-20

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports.

  17. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  18. Human factors engineering plan for reviewing nuclear plant modernization programs

    International Nuclear Information System (INIS)

    O'Hara, John; Higgins, James

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation

  19. Human factors engineering plan for reviewing nuclear plant modernization programs

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, John; Higgins, James [Brookhaven National Laboratory, Upton, NY (United States)

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation.

  20. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  1. Problem of Information Security Traffic on Internet

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2012-10-01

    Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.

  2. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  3. Survey of control-room design practices with respect to human factors engineering

    International Nuclear Information System (INIS)

    Seminara, J.L.; Parsons, S.O.

    1980-01-01

    Human factors engineering is an interdisciplinary speciality concerned with influencing the design of equipment systems, facilities, and operational environments to promote safe, efficient, and reliable operator performance. This emphasis has been applied to most military and space systems in the past 30 y. A review of five nuclear power-plant control rooms, reported in the November-December 1977 issue of Nuclear Safety, revealed that human factors principles of design have generally not been incorporated in present-generation control rooms. This article summarizes the findings of a survey of 20 control-board designers from a mix of nuclear steam-supply system and architect-engineering firms. The interviews with these designers probed design methods currently used in developing control rooms. From these data it was concluded that there is currently no consistent, formal, uniform concern for the human factors aspects of control-room design on the part of the design organizations, the utilities, or the Nuclear Regulatory Commission. Although all the parties involved are concerned with human factors issues, this responsibility is not focused, and human factors yardsticks, or design standards, specific to power plants have not been evolved and applied in the development and verification of control-room designs from the standpoint of the man-machine interface

  4. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    Science.gov (United States)

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  5. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  6. Efficient CRISPR/Cas9-Based Genome Engineering in Human Pluripotent Stem Cells.

    Science.gov (United States)

    Kime, Cody; Mandegar, Mohammad A; Srivastava, Deepak; Yamanaka, Shinya; Conklin, Bruce R; Rand, Tim A

    2016-01-01

    Human pluripotent stem cells (hPS cells) are rapidly emerging as a powerful tool for biomedical discovery. The advent of human induced pluripotent stem cells (hiPS cells) with human embryonic stem (hES)-cell-like properties has led to hPS cells with disease-specific genetic backgrounds for in vitro disease modeling and drug discovery as well as mechanistic and developmental studies. To fully realize this potential, it will be necessary to modify the genome of hPS cells with precision and flexibility. Pioneering experiments utilizing site-specific double-strand break (DSB)-mediated genome engineering tools, including zinc finger nucleases (ZFNs) and transcription activator-like effector nucleases (TALENs), have paved the way to genome engineering in previously recalcitrant systems such as hPS cells. However, these methods are technically cumbersome and require significant expertise, which has limited adoption. A major recent advance involving the clustered regularly interspaced short palindromic repeats (CRISPR) endonuclease has dramatically simplified the effort required for genome engineering and will likely be adopted widely as the most rapid and flexible system for genome editing in hPS cells. In this unit, we describe commonly practiced methods for CRISPR endonuclease genomic editing of hPS cells into cell lines containing genomes altered by insertion/deletion (indel) mutagenesis or insertion of recombinant genomic DNA. Copyright © 2016 John Wiley & Sons, Inc.

  7. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  8. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  9. Sequential use of human-derived medium supplements favours cardiovascular tissue engineering

    NARCIS (Netherlands)

    Riem Vis, P.W.; Sluijter, J.P.G.; Soekhradj - Soechit, R.S.; Herwerden, van L.A.; Kluin, J.; Bouten, C.V.C.

    2012-01-01

    For clinical application of tissue engineering strategies, the use of animal-derived serum in culture medium is not recommended, because it can evoke immune responses in patients. We previously observed that human platelet-lysate (PL) is favourable for cell expansion, but generates weaker tissue as

  10. CASP CompTIA Advanced Security Practitioner Study Guide Exam CAS-001

    CERN Document Server

    Gregg, Michael

    2012-01-01

    Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that as

  11. Human factors engineering design review acceptance criteria for the safety parameter display

    International Nuclear Information System (INIS)

    McGevna, V.; Peterson, L.R.

    1981-01-01

    This report contains human factors engineering design review acceptance criteria developed by the Human Factors Engineering Branch (HFEB) of the Nuclear Regulatory Commission (NRC) to use in evaluating designs of the Safety Parameter Display System (SPDS). These criteria were developed in response to the functional design criteria for the SPDS defined in NUREG-0696, Functional Criteria for Emergency Response Facilities. The purpose of this report is to identify design review acceptance criteria for the SPDS installed in the control room of a nuclear power plant. Use of computer driven cathode ray tube (CRT) displays is anticipated. General acceptance criteria for displays of plant safety status information by the SPDS are developed. In addition, specific SPDS review criteria corresponding to the SPDS functional criteria specified in NUREG-0696 are established

  12. Employment Security of Nurses: Baseline for a Strategic Human Resource Direction

    Directory of Open Access Journals (Sweden)

    Dr. Renante A. Egcas

    2017-11-01

    Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly

  13. Human factors engineering program review model

    International Nuclear Information System (INIS)

    1994-07-01

    The staff of the Nuclear Regulatory Commission is performing nuclear power plant design certification reviews based on a design process plan that describes the human factors engineering (HFE) program elements that are necessary and sufficient to develop an acceptable detailed design specification and an acceptable implemented design. There are two principal reasons for this approach. First, the initial design certification applications submitted for staff review did not include detailed design information. Second, since human performance literature and industry experiences have shown that many significant human factors issues arise early in the design process, review of the design process activities and results is important to the evaluation of an overall design. However, current regulations and guidance documents do not address the criteria for design process review. Therefore, the HFE Program Review Model (HFE PRM) was developed as a basis for performing design certification reviews that include design process evaluations as well as review of the final design. A central tenet of the HFE PRM is that the HFE aspects of the plant should be developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The HFE PRM consists of ten component elements. Each element in divided into four sections: Background, Objective, Applicant Submittals, and Review Criteria. This report describes the development of the HFE PRM and gives a detailed description of each HFE review element

  14. Humanitarian engineering in the engineering curriculum

    Science.gov (United States)

    Vandersteen, Jonathan Daniel James

    There are many opportunities to use engineering skills to improve the conditions for marginalized communities, but our current engineering education praxis does not instruct on how engineering can be a force for human development. In a time of great inequality and exploitation, the desire to work with the impoverished is prevalent, and it has been proposed to adjust the engineering curriculum to include a larger focus on human needs. This proposed curriculum philosophy is called humanitarian engineering. Professional engineers have played an important role in the modern history of power, wealth, economic development, war, and industrialization; they have also contributed to infrastructure, sanitation, and energy sources necessary to meet human need. Engineers are currently at an important point in time when they must look back on their history in order to be more clear about how to move forward. The changing role of the engineer in history puts into context the call for a more balanced, community-centred engineering curriculum. Qualitative, phenomenographic research was conducted in order to understand the need, opportunity, benefits, and limitations of a proposed humanitarian engineering curriculum. The potential role of the engineer in marginalized communities and details regarding what a humanitarian engineering program could look like were also investigated. Thirty-two semi-structured research interviews were conducted in Canada and Ghana in order to collect a pool of understanding before a phenomenographic analysis resulted in five distinct outcome spaces. The data suggests that an effective curriculum design will include teaching technical skills in conjunction with instructing about issues of social justice, social location, cultural awareness, root causes of marginalization, a broader understanding of technology, and unlearning many elements about the role of the engineer and the dominant economic/political ideology. Cross-cultural engineering development

  15. Development of Food Security Information System Based on Business Intelligence in Food Security Agency, Ministry of Agriculture, Indonesia

    OpenAIRE

    Hendrawaty, Manise; Harisno, Harisno

    2014-01-01

    Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...

  16. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    Science.gov (United States)

    2015-01-01

    very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering

  17. Genetic engineering in nonhuman primates for human disease modeling.

    Science.gov (United States)

    Sato, Kenya; Sasaki, Erika

    2018-02-01

    Nonhuman primate (NHP) experimental models have contributed greatly to human health research by assessing the safety and efficacy of newly developed drugs, due to their physiological and anatomical similarities to humans. To generate NHP disease models, drug-inducible methods, and surgical treatment methods have been employed. Recent developments in genetic and developmental engineering in NHPs offer new options for producing genetically modified disease models. Moreover, in recent years, genome-editing technology has emerged to further promote this trend and the generation of disease model NHPs has entered a new era. In this review, we summarize the generation of conventional disease model NHPs and discuss new solutions to the problem of mosaicism in genome-editing technology.

  18. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    International Nuclear Information System (INIS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-01-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits. - Highlights: • Backscattered radiation emitted from the airport security scanners is estimated. • Inverse relation observed between backscattered radiation and scanners distance. • Occupational dose for personnel inspecting the scanners were up to 2.04 mSv/y. • The projected dose of security and engineering staff are well within dose limits.

  19. Developments in the Nuclear Safeguards and Security Engineering Degree Program at Tomsk Polytechnic University

    International Nuclear Information System (INIS)

    Boiko, Vladimir I.; Demyanyuk, Dmitry G.; Silaev, Maxim E.; Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.

    2009-01-01

    Over the last six years, Tomsk Polytechnic University (TPU) has developed a 5 1/2 year engineering degree program in the field of Material Protection Control and Accounting (MPC and A). In 2009 the first students graduated with this new degree. There were 25 job offers from nuclear fuel cycle enterprises of Russia and Kazakhstan for 17 graduates of the program. Due to the rather wide selection of workplaces, all graduates have obtained positions at nuclear enterprises. The program was developed within the Applied Physics and Engineering Department (APED). The laboratory and methodological base has been created taking into consideration the experience of the similar program at the Moscow Engineering Physics Institute (MEPhI). However, the TPU program has some distinguishing features such as the inclusion of special courses pertaining to fuel enrichment and reprocessing. During the last two years, three MPC and A laboratories have been established at APED. This was made possible due to several factors such as establishment of the State innovative educational program at TPU, assistance of the U.S. Department of Energy through Pacific Northwest National Laboratory and Los Alamos National Laboratory, and the financial support of the Swedish Radiation Safety Authority and some Russian private companies. All three of the MPC and A laboratories are part of the Innovative Educational Center 'Nuclear Technologies and Non-Proliferation,' which deals with many topics including research activities, development of new curricula for experts training and retraining, and training of master's students. In 2008, TPU developed a relationship with the International Atomic Energy Agency (IAEA), which was familiarized with APED's current resources and activities. The IAEA has shown interest in creation of a master's degree educational program in the field of nuclear security at TPU. A future objective is to acquaint nuclear fuel cycle enterprises with new APED capabilities and involve

  20. INCORPORATION OF HUMAN FACTORS ENGINEERING ANALYSES AND TOOLS INTO THE DESIGN PROCESS FOR DIGITAL CONTROL ROOM UPGRADES

    International Nuclear Information System (INIS)

    O'HARA, J.M.; BROWN, W.

    2004-01-01

    Many nuclear power plants are modernizing with digital instrumentation and control systems and computer-based human-system interfaces (HSIs). The purpose of this paper is to summarize the human factors engineering (HFE) activities that can help to ensure that the design meets personnel needs. HFE activities should be integrated into the design process as a regular part of the engineering effort of a plant modification. The HFE activities will help ensure that human performance issues are addressed, that new technology supports task performance, and that the HSIs are designed in a manner that is compatible with human physiological, cognitive and social characteristics

  1. Human factors engineering evaluation of the Advanced Test Reactor Control Room

    International Nuclear Information System (INIS)

    Boone, M.P.; Banks, W.W.

    1980-12-01

    The information presented here represents preliminary findings related to an ongoing human engineering evaluation of the Advanced Test Reactor (ATR) Control Room. Although many of the problems examined in this report have been previously noted by ATR operations personnel, the systematic approach used in this investigation produced many new insights. While many violations of Human Engineering military standards (MIL-STD) are noted, and numerous recommendations made, the recommendations should be examined cautiously. The reason for our suggested caution lies in the fact that many ATR operators have well over 10-years experience in operating the controls, meters, etc. Hence, it is assumed adaptation to the existing system is quite developed and the introduction of hardware/control changes, even though the changes enhance the system, may cause short-term (or long-term, depending upon the amount of operator experience and training) adjustment problems for operators adapting to the new controls/meters and physical layout

  2. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  3. KEPCO‧s Activity to Power-Engineer Human Resource Development

    Science.gov (United States)

    Kobashi, Kazushi

    While business environment changes a lot, in order to aim at realization of “what we want the Group to look like in 2030” , it is necessary to cultivate human resources with a strong sense of mission. We need to prepare an opportunity to teach and to be taught, in order to cultivate resources and a measure for connecting every person‧s growth to growth of a company. In chapter one, we show Five Trends for attaining what KANSAI Electric Power Corporation wants to be and explain the importance of human resource development under the changing environment. In chapter two, we explain the fundamental policy of human resource cultivation and describe the development plan and the facilities for training based on the policy in chapter two. In chapter three, we express the specific efforts in the field of maintenance, construction, and operation at the department of Engineering and Operation.

  4. A novel quantum scheme for secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  5. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  6. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  7. Applications of human factors engineering to LNG release prevention and control

    Energy Technology Data Exchange (ETDEWEB)

    Shikiar, R.; Rankin, W.L.; Rideout, T.B.

    1982-06-01

    The results of an investigation of human factors engineering and human reliability applications to LNG release prevention and control are reported. The report includes a discussion of possible human error contributions to previous LNG accidents and incidents, and a discussion of generic HF considerations for peakshaving plants. More specific recommendations for improving HF practices at peakshaving plants are offered based on visits to six facilities. The HF aspects of the recently promulgated DOT regulations are reviewed, and recommendations are made concerning how these regulations can be implemented utilizing standard HF practices. Finally, the integration of HF considerations into overall system safety is illustrated by a presentation of human error probabilities applicable to LNG operations and by an expanded fault tree analysis which explicitly recognizes man-machine interfaces.

  8. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  9. Advanced Course in Engineering (ACE) - Cyber Security Boot Camp

    National Research Council Canada - National Science Library

    Older, Susan

    2008-01-01

    .... ACE achieved its stated objectives by completely immersing students in the cyber-security discipline for ten weeks, through a combination of intense coursework, open-ended problems, and internship...

  10. Zephyr: A secure Internet process to streamline engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  11. Security in a Web 2.0+ World A Standards Based Approach

    CERN Document Server

    Solari , Carlos Curtis

    2010-01-01

    Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems - a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol. Many companies are currently applying security mo

  12. Three Perspectives on DSEEP and Security : Training Goals, Use Cases and the Selection of Security Measures

    NARCIS (Netherlands)

    Möller, B.; Croom-Johnson, S.; Huiskamp, W.

    2013-01-01

    As joint, combined and Civil-Military exercises are becoming increasingly common, the need for security in collective mission simulation is growing. SISO has developed the Distributed Simulation Engineering and Execution Process (DSEEP) standard that provides a recommended process for development,

  13. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  14. Guarding the Gates: Confronting Social Engineering in Nuclear Power

    International Nuclear Information System (INIS)

    LeClair, Jane

    2014-01-01

    The presentation is structured as follows: Overview; Physical Security; Data Security; Intrusion from the Outside; Intrusion From the Inside; Isolate ‘Protected’ Areas; Social Engineering; Questions?

  15. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  16. A study of authorization architectures for grid security

    International Nuclear Information System (INIS)

    Pang Yanguang; Sun Gongxing; Pei Erming; Ma Nan

    2006-01-01

    Grid security is one of key issues in grid computing, while current research focus is put on the grid authorization. There is a brief discussion about the drawback of the common GSI (Grid Security Infrastructure) authorization firstly, then analysis is made on the latest several grid authorization architectures, such as structures, policy descriptions, engines, applications, and finally their features are summarized. (authors)

  17. The Human Factors Engineering in Process Design Modifications CNAT

    International Nuclear Information System (INIS)

    Foronda Delgado, A.; Almeida Parra, P.; Bote Moreno, J.

    2013-01-01

    This contribution presents the process followed at the Almaraz and Trillo Nuclear Power Plants in order to integrate Human Factors Engineering (HFE) in the Design Modifications. This includes the applicable rules and regulations, the classification criteria used to categorize the modification, the activities that are to be carried out in each case, as well as recent examples where the full HFE program model was applied at Almaraz (Alternate Shutdown Panel) and Trillo (Primary Bleed and Feed).

  18. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  19. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  20. Workshop on cooperative and human aspects of software engineering (CHASE 2011)

    DEFF Research Database (Denmark)

    Cataldo, Marcelo; de Souza, Cleidson; Dittrich, Yvonne

    2011-01-01

    is to provide a forum for discussing high quality research on human and cooperative aspects of software engineering. We aim at providing both a meeting place for the growing community and the possibility for researchers interested in joining the field to present their work in progress and get an overview over......Software is created by people for people working in varied environments, under various conditions. Thus understanding cooperative and human aspects of software development is crucial to comprehend how methods and tools are used, and thereby improve the creation and maintenance of software. Over...

  1. Towards a Modernization Process for Secure Data Warehouses

    Science.gov (United States)

    Blanco, Carlos; Pérez-Castillo, Ricardo; Hernández, Arnulfo; Fernández-Medina, Eduardo; Trujillo, Juan

    Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated in the complete DWs’ development process, being traditionally considered in the last stages. Furthermore, legacy systems need a reverse engineering process in order to accomplish re-documentation for detecting new security requirements as well as system’s design recovery to enable migration and reuse. Thus, we have proposed a model driven architecture (MDA) for secure DWs which takes into account security issues from the early stages of development and provides automatic transformations between models. This paper fulfills this architecture providing an architecture-driven modernization (ADM) process focused on obtaining conceptual security models from legacy OLAP systems.

  2. Modelling security properties in a grid-based operating system with anti-goals

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Bicarregui, J.; Matthews, B.; Yang, E.

    2008-01-01

    In this paper, we discuss the use of formal requirements-engineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to represent two security goals for Grid systems, namely authorisation and single-sign on authentication. We apply goal-refinement to derive security requirements for these two security goals and we develop a model of antigoals and show how system vulnerabilities and threats to the security goals can arise from such anti-m...

  3. Genetically engineered mesenchymal stromal cells produce IL-3 and TPO to further improve human scaffold-based xenograft models.

    Science.gov (United States)

    Carretta, Marco; de Boer, Bauke; Jaques, Jenny; Antonelli, Antonella; Horton, Sarah J; Yuan, Huipin; de Bruijn, Joost D; Groen, Richard W J; Vellenga, Edo; Schuringa, Jan Jacob

    2017-07-01

    Recently, NOD-SCID IL2Rγ -/- (NSG) mice were implanted with human mesenchymal stromal cells (MSCs) in the presence of ceramic scaffolds or Matrigel to mimic the human bone marrow (BM) microenvironment. This approach allowed the engraftment of leukemic samples that failed to engraft in NSG mice without humanized niches and resulted in a better preservation of leukemic stem cell self-renewal properties. To further improve our humanized niche scaffold model, we genetically engineered human MSCs to secrete human interleukin-3 (IL-3) and thrombopoietin (TPO). In vitro, these IL-3- and TPO-producing MSCs were superior in expanding human cord blood (CB) CD34 + hematopoietic stem/progenitor cells. MLL-AF9-transduced CB CD34 + cells could be transformed efficiently along myeloid or lymphoid lineages on IL-3- and TPO-producing MSCs. In vivo, these genetically engineered MSCs maintained their ability to differentiate into bone, adipocytes, and other stromal components. Upon transplantation of MLL-AF9-transduced CB CD34 + cells, acute myeloid leukemia (AML) and acute lymphoblastic leukemia (ALL) developed in engineered scaffolds, in which a significantly higher percentage of myeloid clones was observed in the mouse compartments compared with previous models. Engraftment of primary AML, B-cell ALL, and biphenotypic acute leukemia (BAL) patient samples was also evaluated, and all patient samples could engraft efficiently; the myeloid compartment of the BAL samples was better preserved in the human cytokine scaffold model. In conclusion, we show that we can genetically engineer the ectopic human BM microenvironment in a humanized scaffold xenograft model. This approach will be useful for functional study of the importance of niche factors in normal and malignant human hematopoiesis. Copyright © 2017 ISEH - International Society for Experimental Hematology. All rights reserved.

  4. Social engineering: mitigating a stealthy risk.

    Science.gov (United States)

    Maas, Jos

    2014-01-01

    Can a Healthcare Facility (HCF) be victimized by Social Engineering (SE)? Yes, says the author If so, what can you do about it? This article explains what Social Engineering is; how it is used; and how to use proactive security to prevent such an attack.

  5. Safety, reliability, risk management and human factors: an integrated engineering approach applied to nuclear facilities

    International Nuclear Information System (INIS)

    Vasconcelos, Vanderley de; Silva, Eliane Magalhaes Pereira da; Costa, Antonio Carlos Lopes da; Reis, Sergio Carneiro dos

    2009-01-01

    Nuclear energy has an important engineering legacy to share with the conventional industry. Much of the development of the tools related to safety, reliability, risk management, and human factors are associated with nuclear plant processes, mainly because the public concern about nuclear power generation. Despite the close association between these subjects, there are some important different approaches. The reliability engineering approach uses several techniques to minimize the component failures that cause the failure of the complex systems. These techniques include, for instance, redundancy, diversity, standby sparing, safety factors, and reliability centered maintenance. On the other hand system safety is primarily concerned with hazard management, that is, the identification, evaluation and control of hazards. Rather than just look at failure rates or engineering strengths, system safety would examine the interactions among system components. The events that cause accidents may be complex combinations of component failures, faulty maintenance, design errors, human actions, or actuation of instrumentation and control. Then, system safety deals with a broader spectrum of risk management, including: ergonomics, legal requirements, quality control, public acceptance, political considerations, and many other non-technical influences. Taking care of these subjects individually can compromise the completeness of the analysis and the measures associated with both risk reduction, and safety and reliability increasing. Analyzing together the engineering systems and controls of a nuclear facility, their management systems and operational procedures, and the human factors engineering, many benefits can be realized. This paper proposes an integration of these issues based on the application of systems theory. (author)

  6. Safety, reliability, risk management and human factors: an integrated engineering approach applied to nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Vasconcelos, Vanderley de; Silva, Eliane Magalhaes Pereira da; Costa, Antonio Carlos Lopes da; Reis, Sergio Carneiro dos [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil)], e-mail: vasconv@cdtn.br, e-mail: silvaem@cdtn.br, e-mail: aclc@cdtn.br, e-mail: reissc@cdtn.br

    2009-07-01

    Nuclear energy has an important engineering legacy to share with the conventional industry. Much of the development of the tools related to safety, reliability, risk management, and human factors are associated with nuclear plant processes, mainly because the public concern about nuclear power generation. Despite the close association between these subjects, there are some important different approaches. The reliability engineering approach uses several techniques to minimize the component failures that cause the failure of the complex systems. These techniques include, for instance, redundancy, diversity, standby sparing, safety factors, and reliability centered maintenance. On the other hand system safety is primarily concerned with hazard management, that is, the identification, evaluation and control of hazards. Rather than just look at failure rates or engineering strengths, system safety would examine the interactions among system components. The events that cause accidents may be complex combinations of component failures, faulty maintenance, design errors, human actions, or actuation of instrumentation and control. Then, system safety deals with a broader spectrum of risk management, including: ergonomics, legal requirements, quality control, public acceptance, political considerations, and many other non-technical influences. Taking care of these subjects individually can compromise the completeness of the analysis and the measures associated with both risk reduction, and safety and reliability increasing. Analyzing together the engineering systems and controls of a nuclear facility, their management systems and operational procedures, and the human factors engineering, many benefits can be realized. This paper proposes an integration of these issues based on the application of systems theory. (author)

  7. Human-Machine Systems concepts applied to Control Engineering Education

    OpenAIRE

    Marangé , Pascale; Gellot , François; Riera , Bernard

    2008-01-01

    International audience; In this paper, we interest us to Human-Machine Systems (HMS) concepts applied to Education. It is shown how the HMS framework enables to propose original solution in matter of education in the field of control engineering. We focus on practical courses on control of manufacturing systems. The proposed solution is based on an original use of real and large-scale systems instead of simulation. The main idea is to enable the student, whatever his/her level to control the ...

  8. Modern Human Engineering

    International Nuclear Information System (INIS)

    Jeong, Byeong Yong; Lee Dong Kyeong

    2005-08-01

    These are the titles of each chapter. They are as in the following; design of human-centerdness, human machine system, information processing process, sense of human, user interface, elements of human body, vital dynamics, measurement of reaction of human body, estimation and management of working environment, mental characteristic of human, human error, group, organization and leadership, safety supervision, process analysis, time studying, work sampling, work factor and methods time measurement, introduction of muscular skeletal disease and program of preventive management.

  9. Modern Human Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Byeong Yong; Lee Dong Kyeong

    2005-08-15

    These are the titles of each chapter. They are as in the following; design of human-centerdness, human machine system, information processing process, sense of human, user interface, elements of human body, vital dynamics, measurement of reaction of human body, estimation and management of working environment, mental characteristic of human, human error, group, organization and leadership, safety supervision, process analysis, time studying, work sampling, work factor and methods time measurement, introduction of muscular skeletal disease and program of preventive management.

  10. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  11. Recommendations to the NRC on human engineering guidelines for nuclear power plant maintainability

    Energy Technology Data Exchange (ETDEWEB)

    Badalamente, R.V.; Fecht, B.A.; Blahnik, D.E.; Eklund, J.D.; Hartley, C.S.

    1986-03-01

    This document contains human engineering guidelines which can enhance the maintainability of nuclear power plants. The guidelines have been derived from general human engineering design principles, criteria, and data. The guidelines may be applied to existing plants as well as to plants under construction. They apply to nuclear power plant systems, equipment and facilities, as well as to maintenance tools and equipment. The guidelines are grouped into seven categories: accessibility and workspace, physical environment, loads and forces, maintenance facilities, maintenance tools and equipment, operating equipment design, and information needs. Each chapter of the document details specific maintainability problems encountered at nuclear power plants, the safety impact of these problems, and the specific maintainability design guidelines whose application can serve to avoid these problems in new or existing plants.

  12. Recommendations to the NRC on human engineering guidelines for nuclear power plant maintainability

    International Nuclear Information System (INIS)

    Badalamente, R.V.; Fecht, B.A.; Blahnik, D.E.; Eklund, J.D.; Hartley, C.S.

    1986-03-01

    This document contains human engineering guidelines which can enhance the maintainability of nuclear power plants. The guidelines have been derived from general human engineering design principles, criteria, and data. The guidelines may be applied to existing plants as well as to plants under construction. They apply to nuclear power plant systems, equipment and facilities, as well as to maintenance tools and equipment. The guidelines are grouped into seven categories: accessibility and workspace, physical environment, loads and forces, maintenance facilities, maintenance tools and equipment, operating equipment design, and information needs. Each chapter of the document details specific maintainability problems encountered at nuclear power plants, the safety impact of these problems, and the specific maintainability design guidelines whose application can serve to avoid these problems in new or existing plants

  13. Cognitive engineering models: A prerequisite to the design of human-computer interaction in complex dynamic systems

    Science.gov (United States)

    Mitchell, Christine M.

    1993-01-01

    This chapter examines a class of human-computer interaction applications, specifically the design of human-computer interaction for the operators of complex systems. Such systems include space systems (e.g., manned systems such as the Shuttle or space station, and unmanned systems such as NASA scientific satellites), aviation systems (e.g., the flight deck of 'glass cockpit' airplanes or air traffic control) and industrial systems (e.g., power plants, telephone networks, and sophisticated, e.g., 'lights out,' manufacturing facilities). The main body of human-computer interaction (HCI) research complements but does not directly address the primary issues involved in human-computer interaction design for operators of complex systems. Interfaces to complex systems are somewhat special. The 'user' in such systems - i.e., the human operator responsible for safe and effective system operation - is highly skilled, someone who in human-machine systems engineering is sometimes characterized as 'well trained, well motivated'. The 'job' or task context is paramount and, thus, human-computer interaction is subordinate to human job interaction. The design of human interaction with complex systems, i.e., the design of human job interaction, is sometimes called cognitive engineering.

  14. Human Factors Engineering (HFE) insights for advanced reactors based upon operating experience

    International Nuclear Information System (INIS)

    Higgins, J.; Nasta, K.

    1997-01-01

    The NRC Human Factors Engineering Program Review Model (HFE PRM, NUREG-0711) was developed to support a design process review for advanced reactor design certification under 10CFR52. The HFE PRM defines ten fundamental elements of a human factors engineering program. An Operating Experience Review (OER) is one of these elements. The main purpose of an OER is to identify potential safety issues from operating plant experience and ensure that they are addressed in a new design. Broad-based experience reviews have typically been performed in the past by reactor designers. For the HFE PRM the intent is to have a more focussed OER that concentrates on HFE issues or experience that would be relevant to the human-system interface (HSI) design process for new advanced reactors. This document provides a detailed list of HFE-relevant operating experience pertinent to the HSI design process for advanced nuclear power plants. This document is intended to be used by NRC reviewers as part of the HFE PRM review process in determining the completeness of an OER performed by an applicant for advanced reactor design certification. 49 refs

  15. Error-Based Accidents and Security Incidents in Nuclear Materials Management

    International Nuclear Information System (INIS)

    Pond, Daniel J.; Greitzer, Frank L.

    2005-01-01

    Hazard and risk assessments, along with human error analysis and mitigation techniques, have long been mainstays of effective safety programs. These tools have revealed that worker errors contributing to or resulting in accidents are often the consequence of ineffective system conditions, process features, or individual employee characteristics. At Los Alamos National Laboratory (LANL), security, safety, human error, and organizational analysts determined that the system-induced human errors that make accidents more likely also are contributing to security incidents. A similar set of system conditions has been found to underlie deliberate, non-malevolent deviations from proper security practices - termed breaches - that also can result in a security incident. In fiscal-year (FY) 2002, LANL's Security Division therefore established the ESTHER (Enhanced Security Through Human Error Reduction) program to identify and reduce the influence of the factors that underlie employee errors and breaches and, in turn, security incidents. Recognizing the potential benefits of this program and approach, in FY2004 the Department of Energy (DOE) Office of Security Policy (DOE-SO) funded an expansion of ESTHER implementation to the causal assessment and reporting of security incidents at other DOE sites. This presentation will focus on three applications of error/breach assessment and mitigation techniques. One use is proactive, accomplished through the elimination of contributors to error, whereas two are reactive, implemented in response to accidents or security incidents as well as to near misses, to prevent recurrence. The human performance and safety bases of these techniques will be detailed. Associated tools - including computer-based assessment training and web-based incident reporting modules developed by Pacific Northwest National Laboratory - will be discussed

  16. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  17. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  18. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  19. Enhanced normal short-term human myelopoiesis in mice engineered to express human-specific myeloid growth factors.

    Science.gov (United States)

    Miller, Paul H; Cheung, Alice M S; Beer, Philip A; Knapp, David J H F; Dhillon, Kiran; Rabu, Gabrielle; Rostamirad, Shabnam; Humphries, R Keith; Eaves, Connie J

    2013-01-31

    Better methods to characterize normal human hematopoietic cells with short-term repopulating activity cells (STRCs) are needed to facilitate improving recovery rates in transplanted patients.We now show that 5-fold more human myeloid cells are produced in sublethally irradiated NOD/SCID-IL-2Receptor-γchain-null (NSG) mice engineered to constitutively produce human interleukin-3, granulocyte-macrophage colony-stimulating factor and Steel factor (NSG-3GS mice) than in regular NSG mice 3 weeks after an intravenous injection of CD34 human cord blood cells. Importantly, the NSG-3GS mice also show a concomitant and matched increase in circulating mature human neutrophils. Imaging NSG-3GS recipients of lenti-luciferase-transduced cells showed that human cells being produced 3 weeks posttransplant were heterogeneously distributed, validating the blood as a more representative measure of transplanted STRC activity. Limiting dilution transplants further demonstrated that the early increase in human granulopoiesis in NSG-3GS mice reflects an expanded output of differentiated cells per STRC rather than an increase in STRC detection. NSG-3GS mice support enhanced clonal outputs from human short-term repopulating cells (STRCs) without affecting their engrafting efficiency. Increased human STRC clone sizes enable their more precise and efficient measurement by peripheral blood monitoring.

  20. Explore the Human-Based Teaching for the Professional Course of Materials Science and Engineering

    Science.gov (United States)

    Zhao, Yiping; Chen, Li; Zhang, Yufeng

    2008-01-01

    As viewed from two sides such as teacher and student, in this article, we explore the human-based teaching reform for the college professional course of materials Science and Engineering, point out the qualities and conditions that professional teacher should possess in the process of human-based teaching reform of professional course and the…

  1. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  2. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  3. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  4. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  5. Security, Extremism and Education: Safeguarding or Surveillance?

    Science.gov (United States)

    Davies, Lynn

    2016-01-01

    This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…

  6. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  7. Tissue-Engineered Vascular Rings from Human iPSC-Derived Smooth Muscle Cells

    Directory of Open Access Journals (Sweden)

    Biraja C. Dash

    2016-07-01

    Full Text Available There is an urgent need for an efficient approach to obtain a large-scale and renewable source of functional human vascular smooth muscle cells (VSMCs to establish robust, patient-specific tissue model systems for studying the pathogenesis of vascular disease, and for developing novel therapeutic interventions. Here, we have derived a large quantity of highly enriched functional VSMCs from human induced pluripotent stem cells (hiPSC-VSMCs. Furthermore, we have engineered 3D tissue rings from hiPSC-VSMCs using a facile one-step cellular self-assembly approach. The tissue rings are mechanically robust and can be used for vascular tissue engineering and disease modeling of supravalvular aortic stenosis syndrome. Our method may serve as a model system, extendable to study other vascular proliferative diseases for drug screening. Thus, this report describes an exciting platform technology with broad utility for manufacturing cell-based tissues and materials for various biomedical applications.

  8. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  9. A Systems Engineering Approach to Address Human Capital Management Issues in the Shipbuilding Industry

    National Research Council Canada - National Science Library

    Todd, Hal M; Parten, Douglas S

    2008-01-01

    .... This study investigated current DoD Human Capital Management (HCM) strategies for attracting, developing, retaining, and managing competencies and intellectual resources for science and engineering talent within the shipbuilding industry...

  10. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    Science.gov (United States)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  11. The Factor of Food in Biopolitics and National Security

    Directory of Open Access Journals (Sweden)

    Sergey A. Kravchenko

    2014-01-01

    Full Text Available The paper examines the role of food factor in the liberal biopolitics from its birth to the present day. According to the author, the consequences of this policy of food administration are ambivalent in character. On the one hand, there are real gains in mass production of food, its delivery to the consumer, medical supervision of the implementation of its quality. However, on the other hand, the basic principles of this biopolitics - scientism, formal rationalism, pragmatism and commercialism have not allowed to solve the problems of social inequality in the access to healthy food and of illuminating the hunger. In the end of the last century the liberal biopolitics acquired globo-networked and neo-liberal character but the corresponding transition from the national to the global scale administration of food production only intensified risks and challenges of modern human nutrition. In a number of countries including Russia there appeared the problems of food security. The adopted national programs to address these challenges in a "world risk society" (U. Beck will not solve them without fully understanding and practical implementation of the principle of the indivisibility of food security for all peoples of the world and implementation of the global food security. To achieve this, the author believes, it is necessary to abandon the "repair" of the current neo-liberal wing of biopolitics and its pragmatic and mercantilist approaches to human nutrition and pass over to a humanistic biopolitics. There offered a concrete roadmap motion to it, in particular, intending to strengthen the natural sciences and engineering for the production of food with the theoretical instruments of social sciences and humanities; to replace the outdated positivistic, scientistic postulate «knowledge - power" with the formula of ethical, humanistically oriented responsibility of scientists: "the integral knowledge of all sciences - quality food for the health of all

  12. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  13. Genetic Engineering

    Science.gov (United States)

    Phillips, John

    1973-01-01

    Presents a review of genetic engineering, in which the genotypes of plants and animals (including human genotypes) may be manipulated for the benefit of the human species. Discusses associated problems and solutions and provides an extensive bibliography of literature relating to genetic engineering. (JR)

  14. Human Pluripotent Stem Cells to Engineer Blood Vessels.

    Science.gov (United States)

    Chan, Xin Yi; Elliott, Morgan B; Macklin, Bria; Gerecht, Sharon

    2018-01-01

    Development of pluripotent stem cells (PSCs) is a remarkable scientific advancement that allows scientists to harness the power of regenerative medicine for potential treatment of disease using unaffected cells. PSCs provide a unique opportunity to study and combat cardiovascular diseases, which continue to claim the lives of thousands each day. Here, we discuss the differentiation of PSCs into vascular cells, investigation of the functional capabilities of the derived cells, and their utilization to engineer microvascular beds or vascular grafts for clinical application. Graphical Abstract Human iPSCs generated from patients are differentiated toward ECs and perivascular cells for use in disease modeling, microvascular bed development, or vascular graft fabrication.

  15. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    Science.gov (United States)

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  16. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  17. Experiences in the application of human factors engineering to human-system interface modernization

    International Nuclear Information System (INIS)

    Trueba Alonso, Pedro; Illobre, Luis Fernandez; Ortega Pascual, Fernando

    2014-01-01

    Almost all the existing Nuclear Power Plants (NPPs) include plans to modernize their existing Instrumentation and Control (I and C) systems and associated Human System Interfaces (HSIs), due to obsolescence problems. Tecnatom, S.A. has been participating in modernization programs in NPPs to help them to plan, specify, design and implement the modernization of control rooms and associated I and C and HSIs. The application of Human Factors Engineering (HFE) in modernization programs is nowadays unavoidable. This is because is becoming a regulatory requirement, and also because it is needed to ensure that any plant modification, involving the modernization of I and C and HSI, is well designed to improve overall plant operations, reliability, and safety. This paper shows some experiences obtained during the application of HFE to the modernization of these HSIs. The experience applying HFE in modernizations and design modifications show a positive effect, improving the associated HSIs, with the acceptability of the final user. (authors)

  18. Experiences in the application of human factors engineering to human-system interface modernization

    International Nuclear Information System (INIS)

    Trueba Alonso, Pedro; Fernandez Illobre, Luis; Ortega Pascual, Fernando

    2015-01-01

    Almost all the existing Nuclear Power Plants (NPPs) include plans to modernize their existing Instrumentation and Control (I and C) systems and associated Human System Interfaces (HSIs), due to obsolescence problems. Tecnatom, S.A. has been participating in modernization programs in NPPs to help them to plan, specify, design and implement the modernization of control rooms and associated I and C and HSIs. The application of Human Factors Engineering (HFE) in modernization programs is nowadays unavoidable. This is because is becoming a regulatory requirement, and also because it is needed to ensure that any plant modification, involving the modernization of I and C and HSI, is well designed to improve overall plant operations, reliability, and safety. This paper shows some experiences obtained during the application of HFE to the modernization of these HSIs. The experience applying HFE in modernizations and design modifications show a positive effect, improving the associated HSIs, with the acceptability of the final user.

  19. Experiences in the application of human factors engineering to human-system interface modernization

    Energy Technology Data Exchange (ETDEWEB)

    Trueba Alonso, Pedro; Fernandez Illobre, Luis; Ortega Pascual, Fernando [Tecnatom S.A., San Sebastian de los Reyes (Spain). Simulation and Control Rooms Div.

    2015-07-15

    Almost all the existing Nuclear Power Plants (NPPs) include plans to modernize their existing Instrumentation and Control (I and C) systems and associated Human System Interfaces (HSIs), due to obsolescence problems. Tecnatom, S.A. has been participating in modernization programs in NPPs to help them to plan, specify, design and implement the modernization of control rooms and associated I and C and HSIs. The application of Human Factors Engineering (HFE) in modernization programs is nowadays unavoidable. This is because is becoming a regulatory requirement, and also because it is needed to ensure that any plant modification, involving the modernization of I and C and HSI, is well designed to improve overall plant operations, reliability, and safety. This paper shows some experiences obtained during the application of HFE to the modernization of these HSIs. The experience applying HFE in modernizations and design modifications show a positive effect, improving the associated HSIs, with the acceptability of the final user.

  20. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    Science.gov (United States)

    2018-03-01

    employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and human security. This study also...security to the principal who employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and...Uzbek forces, the United States and its allied partners momentarily destroyed most of the al Qaeda operatives in Afghanistan while simultaneously

  1. Nuclear Safeguards and Security Education at Russian Universities

    International Nuclear Information System (INIS)

    Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2008-01-01

    The U.S. Department of Energy is assisting key Russian universities in developing safeguards and security degree programs to prepare the next generation of specialists who will be responsible for protecting nuclear material from illicit use. These programs include course and laboratory work in nuclear material measurements, vulnerability analysis, exterior and interior sensors, and legal aspects of nuclear nonproliferation. Moscow Engineering Physics Institute (MEPhI) has graduated nine classes of masters students, most of who are working in government agencies, research organizations, or pursuing their PhD. With DOE support, MEPhI has also established a 5 1/2-year engineering degree program in safeguards and security. This is a hands-on degree that more closely meets the needs of nuclear facilities. The first class graduated in February 2007, marking a major milestone in Russian nonproliferation education. A second engineering degree program has been established at Tomsk Polytechnic University and is designed to reach those students east of the Ural Mountains, where many nuclear facilities are located. The first class will graduate in February 2009. This paper describes current development of these education programs, new initiatives, and sustainability efforts to ensure their continued viability after DOE support ends. The paper also describes general nonproliferation education activities supported by DOE that complement the more technical safeguards and security education programs.

  2. CORBASec Used to Secure Distributed Aerospace Propulsion Simulations

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test

  3. Security Policy Alignment: A Formal Approach

    NARCIS (Netherlands)

    Pieters, Wolter; Dimkov, T.; Pavlovic, Dusko

    2013-01-01

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks,

  4. Toshiba's activity concerning technology succession and human resource development

    International Nuclear Information System (INIS)

    Ogura, Kenji; Hoshide, Akehiko

    2008-01-01

    Recently, from the viewpoint of the reduction of carbon-dioxide emission that cause global warming and the energy security, the importance of nuclear power generation is recognized again as an effective approach for solving the problems, and many nuclear power plants are planed to be constructed worldwide. On the other hand, the experienced engineers will face the time of the retirement in the near future and technology succession and human resource development has become important problems. In this paper, Toshiba's Nuclear Energy Systems and Services Division's activity concerning technology succession and human resource development will be introduced. (author)

  5. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  6. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  7. 46 CFR 113.35-9 - Mechanical engine order telegraph systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Mechanical engine order telegraph systems. 113.35-9 Section 113.35-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING COMMUNICATION AND ALARM SYSTEMS AND EQUIPMENT Engine Order Telegraph Systems § 113.35-9 Mechanical engine order...

  8. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  9. Islamic movement and human rights: Pertubuhan Jamaah Islah Malaysia’s involvement in the “Abolish Internal Security Act Movement,” 2000-2012

    Directory of Open Access Journals (Sweden)

    Maszlee Malik

    2014-12-01

    Full Text Available Human rights has been acknowledged as one of the essential characteristics of good governance. Abuse of human rights is strongly associated with bad governance, which is believed by many to be a serious impediment to development and sustainable growth. Despite the active participations of Islamic movements in many parts of the political world, very little is known of their involvement in advocating human rights issues as part of their struggle for power. Nevertheless, as an Islamic movement and an Islamic revivalism actor in Malaysia, Pertubuhan Jamaah Islah Malaysia (JIM has shown otherwise. JIM has resembled a different attitude towards the issue of human rights that they believe as an integrated and pertinent composition of good governance. By scrutinising their political activities and discourse since 2000, it becomes clear that JIM has been actively engaged in good governance and human rights issues, especially those that relate to the political rights of citizens through its involvement in the Abolish Internal Security Act (ISA Movement (Gerakan Mansuhkan ISA. This paper examines JIM’s involvement in human rights issues with a special focus on its active and leading role in calling for the abolishment of the Internal Security Act (ISA.

  10. Nasal chondrocyte-based engineered autologous cartilage tissue for repair of articular cartilage defects: an observational first-in-human trial.

    Science.gov (United States)

    Mumme, Marcus; Barbero, Andrea; Miot, Sylvie; Wixmerten, Anke; Feliciano, Sandra; Wolf, Francine; Asnaghi, Adelaide M; Baumhoer, Daniel; Bieri, Oliver; Kretzschmar, Martin; Pagenstert, Geert; Haug, Martin; Schaefer, Dirk J; Martin, Ivan; Jakob, Marcel

    2016-10-22

    Articular cartilage injuries have poor repair capacity, leading to progressive joint damage, and cannot be restored predictably by either conventional treatments or advanced therapies based on implantation of articular chondrocytes. Compared with articular chondrocytes, chondrocytes derived from the nasal septum have superior and more reproducible capacity to generate hyaline-like cartilage tissues, with the plasticity to adapt to a joint environment. We aimed to assess whether engineered autologous nasal chondrocyte-based cartilage grafts allow safe and functional restoration of knee cartilage defects. In a first-in-human trial, ten patients with symptomatic, post-traumatic, full-thickness cartilage lesions (2-6 cm 2 ) on the femoral condyle or trochlea were treated at University Hospital Basel in Switzerland. Chondrocytes isolated from a 6 mm nasal septum biopsy specimen were expanded and cultured onto collagen membranes to engineer cartilage grafts (30 × 40 × 2 mm). The engineered tissues were implanted into the femoral defects via mini-arthrotomy and assessed up to 24 months after surgery. Primary outcomes were feasibility and safety of the procedure. Secondary outcomes included self-assessed clinical scores and MRI-based estimation of morphological and compositional quality of the repair tissue. This study is registered with ClinicalTrials.gov, number NCT01605201. The study is ongoing, with an approved extension to 25 patients. For every patient, it was feasible to manufacture cartilaginous grafts with nasal chondrocytes embedded in an extracellular matrix rich in glycosaminoglycan and type II collagen. Engineered tissues were stable through handling with forceps and could be secured in the injured joints. No adverse reactions were recorded and self-assessed clinical scores for pain, knee function, and quality of life were improved significantly from before surgery to 24 months after surgery. Radiological assessments indicated variable degrees of

  11. Strategic engineering for cloud computing and big data analytics

    CERN Document Server

    Ramachandran, Muthu; Sarwar, Dilshad

    2017-01-01

    This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy. .

  12. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    Science.gov (United States)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  13. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  14. Protocol and the post-human performativity of security techniques.

    Science.gov (United States)

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  15. Engineering Technical Review Planning Briefing

    Science.gov (United States)

    Gardner, Terrie

    2012-01-01

    The general topics covered in the engineering technical planning briefing are 1) overviews of NASA, Marshall Space Flight Center (MSFC), and Engineering, 2) the NASA Systems Engineering(SE) Engine and its implementation , 3) the NASA Project Life Cycle, 4) MSFC Technical Management Branch Services in relation to the SE Engine and the Project Life Cycle , 5) Technical Reviews, 6) NASA Human Factor Design Guidance , and 7) the MSFC Human Factors Team. The engineering technical review portion of the presentation is the primary focus of the overall presentation and will address the definition of a design review, execution guidance, the essential stages of a technical review, and the overall review planning life cycle. Examples of a technical review plan content, review approaches, review schedules, and the review process will be provided and discussed. The human factors portion of the presentation will focus on the NASA guidance for human factors. Human factors definition, categories, design guidance, and human factor specialist roles will be addressed. In addition, the NASA Systems Engineering Engine description, definition, and application will be reviewed as background leading into the NASA Project Life Cycle Overview and technical review planning discussion.

  16. Design engineer perceptions and attitudes regarding human factors application to nuclear power plant design

    International Nuclear Information System (INIS)

    Ma, R.; Jones, J. M.

    2006-01-01

    With the renewed interest in nuclear power and the possibility of constructing new reactors within the next decade in the U.S., there are several challenges for the regulators, designers, and vendors. One challenge is to ensure that Human Factors Engineering (HFE) is involved, and correctly applied in the life-cycle design of the Nuclear Power Plant (NPP). As an important part of the effort, people would ask: 'is the system-design engineer effectively incorporating HFE in the NPPs design?' The present study examines the sagacity of Instrumentation and Control design engineers on issues relating to awareness, attitude, and application of HFE in NPP design. A questionnaire was developed and distributed, focusing on the perceptions and attitudes of the design engineers. The responses revealed that, while the participants had a relatively high positive attitude about HFE, their awareness and application of HFE were moderate. The results also showed that senior engineers applied HFE more frequently in their design work than young engineers. This study provides some preliminary results and implications for improved HFE education and application in NPP design. (authors)

  17. 2nd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Cortesi, Agostino; Saeed, Khalid; Chaki, Nabendu

    2016-01-01

    The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

  18. Generating human resources in nuclear engineering in India: need of the hour

    International Nuclear Information System (INIS)

    Roy, Prateep

    2010-01-01

    With the fast growth of energy requirement scenario, particularly, in India with limited dependence on fossil power and increased emphasis on green power we have lots of nuclear power plant and associated projects in pipeline. This requires enormous human resources trained and qualified in nuclear engineering who will be engaged in all aspects of nuclear plant projects right from conceptualization, design, construction, development, operation, maintenance till decommissioning. As on today, Department of Atomic Energy (DAE) in Government of India is almost the only agency catering to this need. DAE grooms graduate engineers from various disciplines and postgraduates from sciences, specially, Physics and Chemistry. But, it takes enough financial resources and full 1-year duration past graduation from Indian Government. Even after imparting training to these freshly recruited DAE employees, sizeable chunk of the population quit DAE for better prospect such as higher studies abroad, management studies, IT profession etc. Also, the people trained in nuclear engineering are fewer in number than required and the gap would be increasingly large as time progresses and increasing number of nuclear plants would be constructed/operational. Comparatively larger number of engineering graduates currently produced in India are in Computer Engineering/Information Technology rather than in conventional disciplines like Civil, Mechanical, Electrical, Electronics and Telecommunications Engineering. This poses another problem of orienting/motivating the manpower in nuclear fields. Considering these problems the author proposes to produce and develop nuclear engineering graduates directly in the academic institutions which will help the nation in reducing the gap between the increasing demand of manpower in view of large number of nuclear plants in the pipeline and the availability of the nuclear engineers. Even large number of industries related to manufacturing and consultancy also

  19. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  20. Appliance of geochemical engineering in radioactive waste disposal

    International Nuclear Information System (INIS)

    Li Shuang; Zhang Chengjiang; Ni Shijun; Li Kuanliang

    2008-01-01

    The basic foundation of applying geochemical engineering to control environment, common engineering models of disposal radioactive waste and the functions of the engineering barriers are introduced in this paper. The authors take the geochemical engineering barrier materiel research of a radioactive waste repository as an example to explain the appliance of geochemical engineering in the disposal of radioactive waste. And the results show that it can enhance the security of the nuclear waste repository if we use geochemical engineering barrier. (authors)