WorldWideScience

Sample records for international security studies

  1. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  2. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. Anachronistic Research in International Relations and Security Studies

    NARCIS (Netherlands)

    de Wilde, J.H.; Jacob, Edwin Daniel

    2017-01-01

    Anachronisms are widely used in the social sciences and humanities, yet hardly studied. The construction of historical narratives is problematic due to the projection of contemporary thinking. Even more problematic is the use of historical analogies for future planning. Projection of nineteenth

  4. Water security and international law

    OpenAIRE

    Kuokkanen Tuomas

    2017-01-01

    The article explores water security from an international law point of view. The article argues that in order to better understand water security it is important to focus on the function of international water law. Even though water security is a relatively recent concept it was latent in the process of the evolution of international water law. In addition, the article examines the relationship between man and water from the point of view of water security. The article seeks to answe...

  5. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  6. The Social and Economic Security of International Students: A New Zealand Study

    Science.gov (United States)

    Sawir, Erlenawati; Marginson, Simon; Nyland, Chris; Ramia, Gaby; Rawlings-Sanaei, Felicity

    2009-01-01

    International education has generated complex problems of governance. As well as being beneficiaries of educational services and consumers of a product, international students are also migrants, workers and beings with civil rights. Arguably, the regulation of international student security as consumer protection fails to recognize this full range…

  7. Water Security and International Law

    Directory of Open Access Journals (Sweden)

    Tuomas Kuokkanen

    2017-01-01

    Full Text Available The article explores water security from an international law point of view. The article argues that in order to better understand water security it is important to focus on the function of international water law. Even though water security is a relatively recent concept it was latent in the process of the evolution of international water law. In addition, the article examines the relationship between man and water from the point of view of water security. The article seeks to answer the question: how does international water law deal with that relationship? Is water only an object to be utilized and protected or has the relationship become more complex and ambivalent through the occurrence of various extreme events. Furthermore, the article places the concept of water security into a historiographical and substantive context. It explores three broad approaches by international law to water issues: general international law, the regulatory approach and the management approach. The article argues that they are all relevant to water security. Finally, the article seeks to demonstrate that even though water security has emerged as a new notion, this does not mean that international law does not include rules and principles relevant for water security. Indeed, many general principles of international law are applicable in the context of water security. In addition, specific regulations dealing with water quantity and quality issues have been developed in international environmental law, although they are not necessarily labelled as water security rules. Moreover, various risk management methods have been elaborated to deal with water-related disasters and crises. Reciprocally, water security arguments are not necessarily new notions but rather reflect already existing concepts and principles.

  8. Study Regarding the Provision of Security and Safety in the International Maritime Transport

    Directory of Open Access Journals (Sweden)

    Liliana POPA

    2011-11-01

    Full Text Available The security in transport has become a crucial issue internationally, especially after the terrorist attacks of September 2001 and even more recently. Maritime, along with aviation, is considered a sensitive and of high-risk transport sector, in terms of security. Moreover, topics related to safety in maritime transport have become very important over the past decades mostly because of the numerous maritime accidents putting in danger both human lives and the environment. Taking into account the global dimension of maritime transport along with the fact that the participation of Asia in the world trade during the past decade has been substantial, the current maritime safety and security practices apply for all areas. This can only be achieved through the application of high standards and regulations setting the prerequisites for safe and secure navigation. In this direction, a significant number of Directives, Regulations and Initiatives on maritime safety and security have been introduced by international and European organizations, such as the International Maritime Organization, (I.M.O., the International Labour Organization (I.L.O. and the European Union (EU. In the framework of this analysis, the levels of compliance of European and Asian countries, regarding the international legislation, is examined while special emphasis is given on the problems and difficulties encountered during the implementation processes. Furthermore, a number of recommendations aiming to enhance the existing levels of safety and security in maritime transport in both examined area is provided.

  9. Evolution Of Conflict Studies In The International Security Context In Post-Soviet Russia

    Directory of Open Access Journals (Sweden)

    Alexander Ivanovich Nikitin

    2016-01-01

    Full Text Available Article analyses formation and development of the conflict studies in Russia as a sub-discipline within political sciences, on the edge between political theory and studies of international relations and international security. Article defines stages of formation of conflict studies in Russia, analyzes social request for studies of conflicts, considers influence of foreign and international institutes and research, both form the CIS and from other foreign countries, onto the conflict studies in Russia. Author postulates turning of the "New Political Thinking"paradigm elaborated by Gorbachev that allowed reconsidering Moscow's attitude towards various conflicts and rethinking of theoretical principles of conflict analysis, that are not anymore limited to class struggle and ideological contradictions. Introduction of more pluralistic concepts of "socio-political model" and "world order" instead of Marxist category of "socio-economic formation" led to remodeling of international relations along new lines, as well as study contradictions within one social system. Splash of inter-ethnic and separatist conflicts in the first half of the 1990s led to shaping of "practically oriented conflict studies" reflecting political interests of conflict sides in conflicts in Karabakh, Georgia/Abkhazia, Georgia/South Ossetia, Moldova/Transnistria. On the eve of 1990s-2000s formation of theoretical systemic conflict studies as a discipline took place, and this discipline was already quite strongly interfaced with international and foreign conflict studies theory. Article considers role of various institutes of the Russian Academy of Science, research centers including Russian Council on International Affairs, Council on Foreign and Defense Policy? Russian Pugwash Committee, Center for Political and International studies, Moscow Carnegie Center, Russian institute for Strategic Studies, Institute for the USA and Canada Studies, etc. As a separate direction of studies

  10. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  11. Security Assistance and International Programs

    National Research Council Canada - National Science Library

    1997-01-01

    The Department of the Treasury established the Security Assistance and International Programs deposit account on September 26, 1996, in response to a request from the Defense Finance and Accounting...

  12. The EU as an international security provider

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen; Wolff, Stefan; Whitman, Richard

    2015-01-01

    that will emerge from this analysis will then be tested and applied empirically in the following contributions that focus on how particular policies are formulated and implemented, and that analyse, in single and comparative case studies, the impact and effectiveness of the EU as an international security provider....... of analysis, which could serve as the foundation for a mid-range theory of the EU as an international security provider, will examine the relevance of, and apply, existing theories of international relations/international security and foreign policy analysis to the specific case of the EU. The framework...

  13. Global climate change and international security

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  14. Water security and international law | Kuokkanen | Potchefstroom ...

    African Journals Online (AJOL)

    The article explores water security from an international law point of view. The article argues that in order to better understand water security it is important to focus on the function of international water law. Even though water security is a relatively recent concept it was latent in the process of the evolution of international ...

  15. The U.S. National Security Council in Contemporary American International Studies

    Directory of Open Access Journals (Sweden)

    Vladimir V. Pavlov

    2016-01-01

    Full Text Available Established in accordance with the provisions of the National Security Act of 1947, the U.S. National Security Council is the main advisory body to the President of the United States tasked with helping the head of state to make the right decisions on matters related to national security. NSC system has been constantly evolving for some 70 years, and the NSC staff became a separate 'ministry' of a kind, allowing presidential administrations to focus ever-increasing control over American foreign policy in the White House. That is why serious attention is devoted to the National Security Council by American researches studying foreign policy decision-making. Here, a 'three-pronged consensus' exists: functioning and efficiency of the decision-making process is primarily a result of presidential actions; the President will make the best decision after becoming aware of the whole range of possible alternatives and assessing the consequences of each policy option; the position of the National Security Advisor, who is often one of the closest officials to the President and serves as a coordinator of the decision-making process, is considered to be one of the most notable in today's U.S. presidential administrations - and the most influential of those not being a subject to approval by the legislative branch of U.S. government. Any fundamental changes in the practice of U.S. foreign policy mechanism, as well as a decline of the White House influence on foreign policy are unlikely in the short term.

  16. Segurança internacional e normatividade: é o liberalismo o elo perdido dos critical securities studies? International security and normativity: is liberalism the critial securities studies' lost link?

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2008-01-01

    Full Text Available O surgimento, e afirmação, de uma corrente de estudos críticos em segurança internacional plantou firmemente a idéia de que os problemas de segurança internacional não estão meramente relacionados com aspectos objetivos que ameaçam os Estados, mas esses problemas estão relacionados estreitamente com as relações entre indivíduo e emancipação humana. Assim, a condição de segurança em sentido forte tem, como precondição, a emancipação humana. Porém, em que condições esse overlap entre segurança internacional e emancipação acontece? A tese deste artigo é problematizar essas condições, que escapam ao diálogo endógeno dos critical securities studies (CSS. E que uma pista para operacionalização pode ser procurada nos diálogos entre a teoria crítica cosmopolita e a teoria liberal cosmopolita. Essa interseção, ou continuum, aponta a tese do artigo, é possível se os CSS atentam para dimensões do liberalismo político que têm sido negligenciadas, especialmente a democracia pensada em bases transnacionais e as possibilidades da sociedade civil transnacionalizada.The appearance and consolidation of a critical studies approach on international security fortified the claim that international security problems are not merely related to objective threats to states, but are in deep connection with the relationship between the individual and human emancipation. In those terms, a solid security condition is primarily preconditioned by human emancipation. However, in what conditions do international security and emancipation overlap? The present article intends to explore the question, a topic that is not tackled by the endogenous debate of critical security studies (CSS. An interesting path to be followed seems to be the dialogue between cosmopolitan critical theory and cosmopolitan liberal theory. This article argues that an intersection, or continuum, of these two theories would be possible if CSS focused on dimensions

  17. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  18. The impact of potential political security level on international tourism

    Science.gov (United States)

    Young-Rae Kim; Chang Huh; Seung Hyun Kim

    2002-01-01

    The purpose of this study was to investigate the impact of potential political security in an effort to fill in two foregoing research gaps in international tourism. To investigate the relationship between political security and international tourism, a simple regression model was employed. Secondary data were collected from a variety of sources, such as international...

  19. Civil-military relations : enhancing international security

    OpenAIRE

    Fekete, Florian

    2003-01-01

    Approved for public release; distribution is unlimited The thesis describes how civil-military relations at the international level enhance international security, in particular, the way of development of international society in trying to orient its progress towards international peace, security and sustainable development. It focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization, The International Committee of Re...

  20. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  1. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  2. Perspectives on the International and Internal Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2015-01-01

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime

  3. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  4. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  5. International Student Security and English Language Proficiency

    Science.gov (United States)

    Sawir, Erlenawati; Marginson, Simon; Forbes-Mewett, Helen; Nyland, Chris; Ramia, Gaby

    2012-01-01

    "International student security" refers to the international student's maintenance of a stable capacity for self-determining human agency. The article focuses on the role of English-language proficiency in the security of students from English as Foreign Language countries, drawing on evidence from a program of semistructured interviews…

  6. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/aifsc/ · What we do · Funding · Resources · About IDRC. Knowledge. Innovation. Solutions. Careers · Contact Us · Site map. Sign up now for IDRC news and views sent directly to your inbox ...

  7. International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    The responsibility for nuclear security rests entirely with each State. There is no single international instrument that addresses nuclear security in a comprehensive manner. The legal foundation for nuclear security comprises international instruments and recognized principles that are implemented by national authorities. Security systems at the national level will contribute to a strengthened and more universal system of nuclear security at the international level. The binding security treaties are; Convention on the Physical Protection of Nuclear Material, the 2005 amendment thereto, Safeguards Agreements between the Agency and states required in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Model Protocol additional to agreement(s) between State(s) and the Agency for the application of Safeguards Convention on Early Notification of a Nuclear Accident, Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management

  8. International Security in the World Economic Relations

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P

    2016-05-01

    Full Text Available The article discusses the urgent topic of the evolution of international relations, the issue of establishing international security, and the development of international economic cooperation based on the principles of security. In order to analyze the current status of international security in the world and to identify key factors that hinder the way of establishing a positive global community, researches by the international analytical centers together with the institutes for international security and cooperation have been generalized. To this end, both the status of and changes in the Global Peace Index in the recent years has been disclosed, the position of Ukraine in the world according to this index has been examined. It has been proven that the main international security problems are related to the armed conflicts, civil wars, political violence, terrorism impacting the development of humanity as a whole, the status of international relations, the evolution of the world economy as well as national economies. Further researches should be focused on how the status of peace in the countries impacts their economic status and the status of international cooperation in other areas of economic cooperation, excluding the military. It should be answered particularly, how the above indicated status affects strengthening the Ukraine's position in the world.

  9. International Student Security: A View from Beijing

    Science.gov (United States)

    Forbes-Mewett, Helen; Nyland, Chris; Shao, Sijun

    2010-01-01

    Security is an integral component of the relationships that shape the lives of students hosted by foreign countries. International student security became a source of contention between nations in 2008 when China's Government charged that Australia was failing to adequately provide for the safety of Chinese students. We discuss Beck's theorisation…

  10. Better cassava boosts food security | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-28

    Oct 28, 2010 ... IDRC 's LASTING IMPACTS > FOOD SECURITY AND NUTRITION · Cassava: A hardy vegetable that feeds millions · Decades of cassava research bear fruit · Restoring cassava production in Uganda · International Institute for Tropical Agriculture (IITA) · Agriculture and Food Security Program · IDRC Digital ...

  11. International security and arms control

    International Nuclear Information System (INIS)

    Ekeus, R.

    2000-01-01

    The end of the cold war also ended the focus on the bilateral approach to arms control and disarmament. Key concepts of security needed to be revisited, along with their implications for the disarmament and arms control agenda. Though there is currently a unipolar global security environment, there remain important tasks on the multilateral arms control agenda. The major task is that of reducing and eliminating weapons of mass destruction, especially nuclear weapons. The author contends that maintaining reliance on the nuclear-weapons option makes little sense in a time when the major Powers are strengthening their partnerships in economics, trade, peacemaking and building. (author)

  12. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  13. The security in international relations

    OpenAIRE

    Iurie RICHICINSCHI

    2016-01-01

    Regardless the fact that concerns about the nature of relations between states, the causes of war, the peacekeeping issues, the international cooperation and recognition of international actors have preceded with millennia the emergence of the academic field of International Relations as a discipline, this one has been embedded along several centuries in much broader areas of research, whose influence is still manifested today.

  14. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  15. The security in international relations

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-03-01

    Full Text Available Regardless the fact that concerns about the nature of relations between states, the causes of war, the peacekeeping issues, the international cooperation and recognition of international actors have preceded with millennia the emergence of the academic field of International Relations as a discipline, this one has been embedded along several centuries in much broader areas of research, whose influence is still manifested today.

  16. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  17. International security experience in tourism

    Directory of Open Access Journals (Sweden)

    Alexander А. Ryabtsev

    2010-10-01

    Full Text Available The article dwells upon the international experience of the provision of safety in tourism. The problem of safe tourist activities is complex and many – sided, as for tourism to develop and function the safety of travelers, holidaymakers and their personal property is extremely important.

  18. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  19. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  20. International Conference SES 2006. Secure Energy Supply

    International Nuclear Information System (INIS)

    2006-01-01

    The International Conference SES 2006 (Secure Energy Supply, Bezpecna dodavka energie) was realised in Bratislava, during September 26 - 29, 2006 in the hotel Crowne Plaza and deals with most important problems of world and Slovak energetics. In work of Conference took part 108 slovak and 33 foreign participant from 11 countries of the world. Negotiations were realised in five sessions. First two days were devoted to lectures and second two days were visits of selected slovak energetic equipment. On the Conference has resounded matter of fact, that secure energy supply is extremely important subject for economy, but also for population

  1. Climate Change after the International : Rethinking Security, Territory and Authority

    International Nuclear Information System (INIS)

    Stripple, Johannes

    2005-01-01

    What does a politics after the international mean? Many strands of contemporary scholarship converge on the image of the international as obsolete, but strongly diverge on the contours of the kinds of politics that are superseding it. The modern state has been pivotal to the meaning of security, territory and authority - concepts central to the idea of the international - but they do not necessarily have to be tied to the state. This thesis offers a critique of International Relations theory combined with a study of climate change. A departure in 'process philosophy' facilitate a rethinking of security, territory and authority as activities rather than things, as verbs rather than nouns. The author shows that a multiplicity of practices of securitization, territorialization, and authorization are visible in the climate issue. The book goes beyond, and reflects upon, the traditional study of 'International Environmental Politics' as a particular subfield of International Relations

  2. Authority of Security Council to Stop the Jurisdiction of International Criminal Court: Case Study of Security Council Resolution Number 1497 (2003)

    OpenAIRE

    Sefriani, Sefriani

    2009-01-01

    Though United Nation Security Council is a permanent organ within the UN, this organ is not party of the Rome Statute 1998. As Such, the Security Council is not entitled by the right to amend section 16 of the Rome Statute 1998 which eliminate the jurisdiction of ICC on the UN troops who are the citizen of Non Party in the Rome Statute 1990

  3. TRANSNATIONAL ORGANIZED CRIME. AN (INTERNATIONAL SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ionel Stoica

    2016-10-01

    Full Text Available For the past two decades organized crime has become a transnational phenomenon, and its impact is still far from being fully known and understood by common people. Its forms of manifestation, whether explicit, or subtle, are permanently evolving and adapting. As a result, its interference with the activities from the legal area makes it difficult to identify and counteract. After a long period of time when it was more a peripheral phenomenon, current transnational organized crime tends to become a major danger to the political, social and economic stability of the states. Through its nature and goals, as well as through the complexity of its forms of manifestation, transnational organized crime represents a major challenge for the state and nonstate organizations that deal with national and international security This paper focuses on the phenomenon starting from some of the most influent theories in international relations, presents the current features of transnational organized criminal groups and analyzes the causes and the favoring factors of the phenomenon, as well as the impact of the phenomenon upon national and international security at political, economic-financial and military level. The approach is an interdisciplinary one and also covers the nexus between transnational organized crime and international terrorism.

  4. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  5. A feminist approach to security studies

    OpenAIRE

    Gasztold, Aleksandra

    2017-01-01

    The main goal of this article is to present problems related to using a feminist approach in security studies. The starting point are some of the basic terms used in the internally diverse sphere of feminist theory and their application in the field of political science. An attempt is also made to define the objectives of selected feminist studies that can be used in the analysis of domestic and international security issues. The main thesis of the article is the assertion that se...

  6. Maintaining International Peace and Security: Reflections on Peace ...

    African Journals Online (AJOL)

    Maintaining International Peace and Security: Reflections on Peace-Support Operations in Africa. DR THEO NEETHLING. Centrefor Military Studies, University of Stellenbosch. ABSTRACT. The shift from a bipolar to a multipolar and multi-faceted world has reduced the risk of conventional inter-state wars, but has been the ...

  7. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  8. The role of the media in establishing international security regimes

    Directory of Open Access Journals (Sweden)

    Chanan Naveh

    2005-04-01

    Full Text Available This article focuses primarily on the media's impact on international security regimes. It explores the ways in which the media affect the lifecycles of international regimes, from the time they are first conceived of, through their establishment, consolidation and stabilization, up until their ultimate demise. Although this paper highlights the media's role in the evolution of security regimes, it is clear that, regardless of the regime in question, media play a role throughout the lifecycle of all international regimes, whatever their character. In order to analyze the relationships of the media with security regimes in general, and specifically their contribution to each stage in their development, the article utilizes methodologies from the field of communication studies. It examines the media's agenda, "news values" and various functions, and their ability to mobilize public support for the particular issue of the regime. To date, most studies have explored the interaction between media communication patterns and global developments at the state level, or in relation to the formulation of foreign policy, while largely ignoring the international dimension of the relationship. This article attempts to remedy this situation, and the relevant processes are analysed in a case study of the anti-Iraq international security regime. It should be noted that although the paper focuses on the specific anti-Iraqi regime, it is part of a more general Anti-Rogue actors regime which includes the war against global terrorism. The study of the development of the anti-Iraq press-security regime teaches us that during international crises the media mobilize and unanimously support the regime fighting the "bad guys." But, when the regime develops and enters disputed turfs and begins to lose its legitimacy, media support diminishes, and the media may even develop into an opposing force and may join the actors fighting against this regime. Moreover, the study of

  9. Common Operating Picture: UAV Security Study

    Science.gov (United States)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  10. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  11. Water security - Nation state and international security implications

    Science.gov (United States)

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  12. Global Consortium on Security Transformation | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The proposed Global Consortium on Security Transformation emerged from discussions between members of an informal network of scholars and practitioners in the fields of security reform and governance in different regions of the South. This grant will establish the Consortium as a joint venture between the Institute of ...

  13. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Job Summary Under the supervision of the Manager, Local Operations (MLO), the Security and Office Administration Coordinator effectively manages all matters related to the security of IDRC employees in Nairobi, and to the protection of assets at the ROSSA. The incumbent collaborates with the Office Administration ...

  14. School of International Graduate Studies (SIGS) Home

    OpenAIRE

    2014-01-01

    School of International Graduate Studies at the Naval Postgraduate School website homepage. The School of International Graduate Studies (SIGS) conducts research and offers various education opportunities in international security studies. Programs seek to identify and address current and emerging security challenges and strengthen multilateral and bilateral defense cooperation between the United States and other nations.

  15. International Reactor Innovative and Secure (IRIS) summary

    International Nuclear Information System (INIS)

    Carelli, Mario D.

    2001-01-01

    The IRIS (International Reactor Innovative and Secure) reactor is described in the first part of the presentation. IRIS is a light water cooled reactor with an integral configuration, where steam generators, pumps and pressurizer are inside the reactor vessel. Partially funded by the DOE NERI program, IRIS is being developed by an international consortium of 16 organizations from seven countries. A key IRIS characteristic is its 'safety by design' approach which strives to eliminate, by design, as many accidents as possible rather than coping with their consequences. Initial returns are very positive; out of the eight Class IV accidents considered in the AP600 only one remains as a Class IV in IRIS, and at much reduced probability. Small-to-medium LOCAs have minimal consequences as the core remains safely under water for days, without the need for safety injection or water makeup. In spite of its novelty IRIS is firmly grounded on proven LWR technology and therefore a prototype is not needed to assure design certification. Rather, very extensive scaled tests will be performed to investigate the performance of in-vessel components such as steam generators and pumps, both individually and as interactive systems. Accident sequences will also be simulated and tested to prove IRIS safety by design claims. The first core fuel is less than 5% enriched and the fuel assembly is very similar to existing PWR assemblies, so there is no licensing challenge regarding the fuel. Because of the safety by design approach, yielding simplifications In design and accident management (e.g., IRIS does not have an emergency core cooling system), some accident scenarios are eliminated and others have lesser consequences. Thus, simplification and streamlining of the regulatory process might be possible. Risk informed regulation will be coupled with safety by design to show lower accident and damage probabilities. This could lead to a relaxation of siting regulatory requirements. It is

  16. The Impact of Regional Higher Education Spaces on the Security of International Students

    Science.gov (United States)

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  17. Human rights and internal security in Malaysia rhetoric and reality

    OpenAIRE

    Rahim, Noor Hishmuddian

    2006-01-01

    Since 1957, Malaysia has faced external and internal security threats. Over time, Malaysia has succeeded in solving the external threats but internal threats remained. The internal threats have come in many forms, including ethnic conflict, religious extremism and deviationism, and terrorism. Since the safety of the public lies in the hands of the government, measures have been taken to ensure the nation's stability and security, including restriction on civil and political liberties. This th...

  18. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  19. The Nepalese Army in Internal Peace and Security

    Science.gov (United States)

    2013-06-14

    the military operating in internal security environment. In Securing Failed Inner-City Communities: The Military’s Role, Oral O’B. Khan advocates...of self-governance and to promote general welfare by making provisions for the protection and promotion of human rights, by maintaining tranquility ...Indiana University Press. Khan, Oral O’B. 1997. Securing failed inner-city communities: The military role. Master’s Thesis, Command and General Staff

  20. Internal Security Crisis in Nigeria: Causes, Types, Effects and ...

    African Journals Online (AJOL)

    The main objective of this research is to show that the causes of internal security are inevitable and it is part of the fabrics of the society. What the society showed strive for is regulation of crisis or its amicable settlement whenever it arises. Since the extinction of security crisis seems impossible, all the society needs is a ...

  1. CENTER FOR CYBER SECURITY STUDIES

    Data.gov (United States)

    Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...

  2. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  3. International Conference SES 2009: Secure Energy Supply

    International Nuclear Information System (INIS)

    2009-01-01

    The Conference included the following sessions: Opening addresses; (I) Energy policy; (II) Environment, Renewable sources and NPPs; (III) Secure energy supply - New nuclear units. Verbal 21 presentations have been inputted into INIS, all in the form of the full authors' presentations.

  4. The Internal Aspects of Ukrainian National Security

    National Research Council Canada - National Science Library

    Bazhenov, Igor

    1997-01-01

    .... Poor economic conditions, organized crime, high levels of corruption within the government, and an irresponsible parliament are the primary causes of instability in Ukraine. Resolution of these issues is vital to Ukrainian National Security as well as the continuation of Ukrainian independence.

  5. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The role of the position is to provide a balanced IT security solutions which ensure the confidentiality, integrity and availability of the organisation's information. This is ... Also to ensure a high quality of service and cross training of skills provides mentoring of such activities to more junior infrastructure members. Monitors ...

  6. Agriculture and Food Security | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    We invest in projects that bring food, nutrition, and income to small-scale farmers and their families. ... Contribute to the development of improved market access and agricultural value chains for smallholders. Support ... Funding. The Agriculture and Food Security program funds research primarily through competitive calls.

  7. Security and Democracy in Southern Africa | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2007-11-15

    operation initiatives, seeking to roll out the principles of the United ... Based on national studies conducted by African academics and security practitioners over three years, it includes an examination of the way security is ...

  8. The Concept of Security in International Relations Theory

    Directory of Open Access Journals (Sweden)

    Gabriel Orozco

    2006-01-01

    Full Text Available The end of the Cold War and the emergence of globalisation have transformed the reality of International Relations, which has meant a change in the theories which this reality had assumed. The concept of security reveals itself as an organisational idea on the different phenomena of globalisation, carrying out a programme of research that goes beyond the realistic presumptions of military power or of the idealistic principles of research for peace. This article explores the new meanings of security for International Relations theory and discusses the theoretical models that influence policy design and that aim to confront the problems and challenges of security in globalisation.

  9. The international safeguards and domestic safeguards and security interface

    International Nuclear Information System (INIS)

    Whitworth, A.

    1996-01-01

    The International Safeguards Division, in conjunction with the Office of Safeguards and Security, organized a workshop on the international safeguards/domestic safeguards and security interface that was held in March 1996. The purpose of the workshop was to identify and resolve domestic safeguards and security issues associated with the implementation of International Atomic Energy Agency (IAEA) safeguards in the Department of Energy (DOE) complex. The workshop drew heavily upon lessons learned in the application of IAEA safeguards at storage facilities in oak Ridge, Hanford, and Rocky Flats. It was anticipated that the workshop would facilitate a consistent DOE safeguards and security approach for the implementation of IAEA safeguards in the DOE complex. This paper discusses the issues and resolutions of several issues raised at the workshop that involve primarily the domestic material control and accountability program

  10. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  11. Globalizing security: A challenge for your generation, 25 May 2006, Washington, DC, Johns Hopkins University, Paul H. Nitze School of Advanced International Studies (SAIS)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2006-01-01

    We still have not outlawed the 'big guns': nuclear weapons. Under the 1970 Treaty on the Non-Proliferation of Nuclear Weapons - the five countries that had nuclear weapons at the time - China, France, Great Britain, the Soviet Union and the United States - committed themselves to 'negotiate in good faith' effective measures for the elimination of nuclear weapons and, in the meantime, to share peaceful nuclear technology with any other countries party to the Treaty. In return, those other countries agreed not to pursue nuclear weapons. On the one hand, efforts to control the spread of nuclear weapons through the NPT treaty regime can be viewed as a remarkable success. With the exception of India, Israel and Pakistan, every country in the world has joined the NPT. The vast majority of NPT members have stood by their commitments. And the number of nuclear warheads has been reduced by more than 50 percent from its Cold War peak. On the other hand, in recent years, we seem to have come to an impasse, and many see the NPT regime as faltering. We have lost our sense of direction. Today we have eight or nine countries that possess nuclear weapons - and more than 20 other members of alliances that continue to rely on these weapons for their security. Some countries are actually announcing programmes for modernizing their stockpiles, and some have even spoken of the possibility of using such weapons - all the while insisting that they are off-limits to others. International peace and security cannot be achieved through business as usual with our existing norms and institutions. Clearly, these norms and institutions - whether the NPT or the UN Security Council - are far from perfect. They need to be strengthened in a variety of ways. But beyond the re-engineering of these norms and institutions, we need a complete change of mindset. Most importantly, our approach to security can no longer be centred on the idea of U s Versus Them . It must instead be anchored on the idea of

  12. Civil-Military Relations: Enhancing International Security

    National Research Council Canada - National Science Library

    Fekete, Florian

    2003-01-01

    .... In particular, it focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization and The International Committee of Red Cross...

  13. Neither International nor Global: Rethinking the Problematic Subject of Security

    Directory of Open Access Journals (Sweden)

    David Chandler

    2010-09-01

    Full Text Available This paper argues that the problematic of the international and the global has been a barrier to understanding the transformation of security discourse over the last decade. Academic treatments of security within the discipline of international relations have been structured by the traditional liberal binaries, which conceive of political communities capable of constituting securing subjects at either the level of the state or the global. Today’s dominant framing of the security problematic seems to evade easy articulation within this structure and in some readings is seen to presage a transitory stage from the international to the global. An alternative reading is sketched out here, that of the post- liberal, which suggests that the apparent shift towards the global can not be captured from within the liberal problematic and highlights that rather than traditional disagreements over the nature of the subject of security – the constitution of the securing actor – we are witnessing the disappearance of securing agency itself.

  14. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  15. Newsletter, School of International Graduate Studies (SIGS) / Spring 2010

    OpenAIRE

    2010-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  16. Newsletter, School of International Graduate Studies (SIGS) / Fall 2010

    OpenAIRE

    2010-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  17. Newsletter, School of International Graduate Studies (SIGS) / Winter 2010

    OpenAIRE

    2010-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  18. SIGS NEWS, School of International Graduate Studies / Summer 2011

    OpenAIRE

    2011-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California.

  19. Newsletter, School of International Graduate Studies (SIGS) / Fall 2011

    OpenAIRE

    2011-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  20. SIGS NEWS, School of International Graduate Studies / Winter 2010

    OpenAIRE

    2010-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California.

  1. Newsletter, School of International Graduate Studies (SIGS) / Summer 2011

    OpenAIRE

    2011-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  2. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  3. Canadian International Food Security Research Fund

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improve soil fertility. • Double farmers' incomes. • Establish community-based seed systems and small seed businesses. • Improve dietary diversity by increasing the amount of pulses sold in local and international markets. • Expand supply and demand for three-to-five pulse-based products with enhanced nutritional quality.

  4. Bourdieu, International Relations and European Security

    DEFF Research Database (Denmark)

    Berling, Trine Villumsen

    2012-01-01

    Despite promising attempts to apply the sociology of Pierre Bourdieu to International Relations (IR), the field could still profit from unexplored potential in his thinking for understanding pivotal theoretical and empirical puzzles. This article takes the failure to fully grasp the paradigmatic...

  5. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  6. Discrimination, Internalized Homonegativity, and Attitudes Toward Children of Same-Sex Parents: Can Secure Attachment Buffer Against Stigma Internalization?

    Science.gov (United States)

    Trub, Leora; Quinlan, Ella; Starks, Tyrel J; Rosenthal, Lisa

    2017-09-01

    With increasing numbers of same-sex couples raising children in the United States, discriminatory attitudes toward children of same-sex parents (ACSSP) are of increasing concern. As with other forms of stigma and discrimination, lesbian, gay, and bisexual (LGB) individuals are at risk for internalizing these societal attitudes, which can negatively affect parenting-related decisions and behaviors and the mental and physical health of their children. Secure attachment is characterized by positive views of the self as loveable and worthy of care that are understood to develop in early relationships with caregivers. Secure attachment has been associated with positive mental and physical health, including among LGB individuals and couples. This study aimed to test the potential buffering role of secure attachment against stigma internalization by examining associations among secure attachment, discrimination, internalized homonegativity (IH), and ACSSP in an online survey study of 209 U.S. adults in same-sex relationships. Bootstrap analyses supported our hypothesized moderated mediation model, with secure attachment being a buffer. Greater discrimination was indirectly associated with more negative ACSSP through greater IH for individuals with mean or lower levels, but not for individuals with higher than average levels of secure attachment, specifically because among those with higher levels of secure attachment, discrimination was not associated with IH. These findings build on and extend past research, with important implications for future research and clinical work with LGB individuals, same-sex couples, and their families, including potential implementation of interventions targeting attachment security. © 2016 Family Process Institute.

  7. 75 FR 32977 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-06-10

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Permit Opening Transactions by Market Makers To Accommodate Closing Transactions of Other Market... International Securities Exchange, LLC (``Exchange'' or ``ISE'') filed with the Securities and Exchange...

  8. SETT facility of International Nuclear Security Academy

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Hyung Min [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2012-05-15

    After the Cold War was put to an end, the international community, especially the Western world, was concerned about Soviet nuclear materials falling into wrong hands, especially of terrorists. Later, the growing threat posed by terrorist networks such as the Taliban and al Qaeda led to a global campaign to deny such networks materials which may be used for the development of Weapons of Mass Destruction (WMD). The 9 11 attacks made a section of the international community highly apprehensive of WMD terrorism, especially its nuclear version. From this point of view, it is clear that nuclear facilities which contain nuclear materials are very attractive targets for those who have intention of nuclear terror

  9. Education and human survival: The relevance of the global security framework to international education

    Science.gov (United States)

    Williams, Christopher

    2000-07-01

    The nature of international education as a field of studies has been affected by global changes over the past decade. At the same time, the concept of global security has emerged, bringing together studies related to development, the environment and the understanding of violence. Although much of the education literature reflects the global security approach, it is not a field that has been subjected to much analysis as a whole. This paper provides an assessment of international education as a discipline, and outlines the global security framework. It examines how this framework is reflected in the forms of analysis used by international educationists. Finally it suggests how the central purpose of global security, namely ensuring human survival, could be adopted within international education to provide a clear sense of direction. This has specific implications for such areas as curriculum, assessment, educational provision and planning.

  10. International symposium on nuclear security. Book of extended synopses

    International Nuclear Information System (INIS)

    2009-01-01

    The International Symposium on Nuclear Security took place within a context of international acknowledgement that the threat of nuclear terrorism required dedicated action by the international community, States, industry and others. The Symposium dealt with those issues involved in protecting nuclear and other radioactive material from criminals. It also took place against a backdrop of renewed interest in nuclear technology: increased use of nuclear power, and increased use of radioactive isotopes in medicine and in industry. These are welcome developments, since nuclear energy and technology can indeed contribute to the technological and economic welfare of many countries, without compromising public health or the environment. In this context, security measures should not impede State programmes for peaceful use of nuclear technology. The symposium dealt with (1) the threat of nuclear terrorism and of other nuclear-related criminal acts; (2) international response and cooperation; (3) safety, security and safeguards; (4) securing material and facilities; (5) unregistered and uncontrolled radioactive substances; (6) information sharing; (7) role of industry and (8) IAEA nuclear security programme. Each of the 87 articles of this book of extended synopses has been indexed separately

  11. The Conceptualization of Energy Security: the International Experience

    Directory of Open Access Journals (Sweden)

    Muzychenko Mykola V.

    2017-08-01

    Full Text Available The article reviews and analyzes existing interpretations of the term of «energy security», which are used by international organizations, individual countries, and foreign scientists. As result of a generalization of the numerous existing conceptual-methodical and substantive approaches to the definition of energy security, its main components and possible ways of its ensuring, it has been found that the concept of energy security includes many multifactor components that are interconnected by numerous functional linkages, including economic, political, social, and ecological aspects. The issues related to geology, geography, and time factor have impact on interpretation of energy security. But in general, energy security can be seen in a one-aspect dimension that is largely based on the security of energy supplies (availability of energy resources and in a multi-aspect dimension which, in addition to the security of energy supplies, also takes into consideration a number of other important interrelated aspects of energy security, particularly in the areas of accessibility of energy resources, energy efficiency, and environmental safety.

  12. 76 FR 17466 - Self-Regulatory Organizations; International Securities Exchange, Inc. (n/k/a the International...

    Science.gov (United States)

    2011-03-29

    ... a specialist market with heterogeneously informed agents,'' Journal of Financial Economics 14 (1985... Organizations; International Securities Exchange, Inc. (n/k/a the International Securities Exchange, LLC); Order.... Introduction On January 5, 2006, the International Securities Exchange, Inc. (n/ k/a the International...

  13. The Role of Europe in Peacekeeping and International Security

    Directory of Open Access Journals (Sweden)

    Pablo Antonio Fernández Sánchez

    1998-09-01

    Full Text Available All of the States in Europe belong to the United Nations and two of them enjoy status as Permanent Members of the Security Council, which is the primordial organism for dealing with peacekeeping and international security. Besides this, one or two European States have almost always been chosen to form part of the Security Council as rotating, non-permanent members, with voting priviliges and the capacity to design policies for peacekeeping and international security. Such State participation in the Security Council is not carried out collectively, but rather individually, which explains, in part, Europe’s political “dwarfism” in regards these two matters. Another aspect to consider is this: The 15 Member States of the European Union pay, on time, 35.41% of the United Nation’s budget, whereas the one State that pays the most, 25%, the United States of America, is a nation in persistent arrears, if not an endemic debtor. Before this, though, national egoisms ask each European country to impart its own foreign policy, a fact observed when each deals with security and peace matters. This individualistic isolationism is prejudicial to the many European interests, which are seen as fragmented if not in confrontation. The problematic above is seen to be growing in complexity for lack of a common defense structure that allows for pre-existent structures and logistics to facilitate the work of the United Nations in matters of peacekeeping and international security. To an analysis of these issues are these pages dedicated.

  14. 77 FR 71850 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-12-04

    ... SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities... Market Data Offering November 28, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of..., the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities...

  15. 78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice

    Science.gov (United States)

    2013-08-20

    ... related aspects of public diplomacy. The agenda for this meeting will include classified discussions... DEPARTMENT OF STATE [Public Notice 8419] International Security Advisory Board (ISAB) Meeting...)(1), it has been determined that this Board meeting will be closed to the public because the Board...

  16. Food Security and HIV/AIDS | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-12-16

    Dec 16, 2010 ... There is growing recognition of the effect food policy can have on HIV/AIDS, and vice versa. The Regional Network on HIV/AIDS, Rural Livelihoods and Food Security (RENEWAL) was launched in 2001 as a joint project between the International Service for National Agricultural Research and the ...

  17. What factors determine international real estate security returns?

    NARCIS (Netherlands)

    Hamelink, F.; Hoesli, M.

    2004-01-01

    We use constrained cross-sectional regressions to disentangle the effects of various factors on international real estate security returns. Besides a common factor, pure country, property type, size and value/growth factors are considered. The value/growth measure that is used in this paper provides

  18. Evaluating the Level of Internal Control System in the Management of Financial Security of Bank

    Directory of Open Access Journals (Sweden)

    Pidvysotska Lyudmyla J.

    2017-06-01

    Full Text Available The article is aimed at studying the organization and technology of evaluation process of the internal control system of bank in order to ensure financial security management of its activities. The work of the internal audit service on monitoring and evaluating the performance of the bank’s internal control system was analyzed. It has been found that improving the level of financial security of commercial banks is conditional upon improvements in the quality of audits and the provision of sound and objective conclusions. The interrelation of the tasks of internal audit service and the tasks of bank’s financial security management has been determined. Methodological recommendations on evaluation of the bank’s internal control system on the basis of results of audit have been proposed.

  19. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  20. Theoretical Aspects of Analysis of International Environmental Security

    Directory of Open Access Journals (Sweden)

    Juliya A. Rusakova

    2015-01-01

    Full Text Available Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. Dealing with this issue is of outmost importance since its failure will render all other issues and challenges as negligible. The article examines the theoretical aspects of solving the problem of environmental security. In particular, it analyzes the problem of negative social externalities, and the related concept of "tragedy of the commons." These problems create a fundamental obstacle to the implementation of environmental security at the global level. Traditionally, the problem of externalities in the environmental field have been approached economically, states and their manufacturers were to pay for the externalities in the form of additional taxes. However, experience shows that the economic tools of dealing with environmental security are not effective. The author suggests alternative non-economic approaches: strengthening and developing the system of permanent institutions of international negotiations on environmental security and promotion of environmental awareness. Solving the acute environmental problems is impossible without a change of the political philosophy of the ruling elites in most states.

  1. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  2. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  3. International migration: security concerns and human rights standards.

    Science.gov (United States)

    Crépeau, François; Nakache, Delphine; Atak, Idil

    2007-09-01

    Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns.

  4. Security Assistance in Nigeria: Shaping the International Environment to Meet U.S. National Security Objectives in the Global Era

    National Research Council Canada - National Science Library

    Prendergast, Kenneth

    2003-01-01

    .... While American interests in Sub-Saharan Africa are significant and growing, there are also important transnational security threats, infectious diseases, organized international criminal activities...

  5. Development of international guidelines for RAM shipment security

    International Nuclear Information System (INIS)

    Luna, R.E.

    2004-01-01

    In October of 2003 a weeklong IAEA Technical Meeting developed a set of guidelines for providing security to consignments of radioactive materials in transport. These guidelines will be published shortly in an IAEA TECDOC. The guidelines produced reflect consideration of many influences and concerns that currently revolve around the potential for terrorist use of radioactive material for malevolent ends. The influences discussed here include: public perception of hazard and concern that new requirements will further limit global shipping capability, international efforts to control sealed sources, national efforts to increment protection on selected materials, the basis for exemption of materials, concern for cost impacts of overly broad requirements, questions on how to adjust requirements for a national threat assessment, and issues relating to consistency within the international community on security needs

  6. Development of international guidelines for RAM shipment security

    Energy Technology Data Exchange (ETDEWEB)

    Luna, R.E.

    2004-07-01

    In October of 2003 a weeklong IAEA Technical Meeting developed a set of guidelines for providing security to consignments of radioactive materials in transport. These guidelines will be published shortly in an IAEA TECDOC. The guidelines produced reflect consideration of many influences and concerns that currently revolve around the potential for terrorist use of radioactive material for malevolent ends. The influences discussed here include: public perception of hazard and concern that new requirements will further limit global shipping capability, international efforts to control sealed sources, national efforts to increment protection on selected materials, the basis for exemption of materials, concern for cost impacts of overly broad requirements, questions on how to adjust requirements for a national threat assessment, and issues relating to consistency within the international community on security needs.

  7. China's conception of energy security : sources and international impacts

    International Nuclear Information System (INIS)

    Constantin, C.

    2005-01-01

    The unique challenges and opportunities associated with China's rapid economic growth were discussed with reference to the potential risk of political disruption or destabilizing international markets. The author notes that two common mistakes are typically made when assessing the evolution of China's energy policy. The first is that China's future path is assimilated with that of developed countries, thereby dismissing evidence that might point toward a different relationship with energy. Second, analysts tend to focus on the external expression of China's energy needs, its oil imports, while overlooking other energy-related issues such as insufficient electricity supplies or environmental degradation. The author argues that Chinese leadership is redefining its understanding of what constitutes energy security for the country. This report assesses the international impacts of such a redefinition along with the international aspects of a business-as-usual scenario in which China pursues its traditional model of energy security. It was emphasized that two different views of energy security lead to different sets of challenges and opportunities for western governments and businesses. 101 refs., 2 figs

  8. Current status of international training center for nuclear security and security issues in Korea

    International Nuclear Information System (INIS)

    Lee, Jong-UK; Sin, Byung Woo

    2013-01-01

    During the 2010 Nuclear Security Summit (NSS) President Lee declared that Korea will establish an international training center (ITC) for nuclear security near the Korea Institute of Nuclear Nonproliferation and Control (KINAC). It will be open to the world in 2014. The government's long term goal is to make the center a hub for education and training in the nuclear field in Asia. The ITC will accomplish this by establishing facilities for practical and realistic exercises through the use of a test bed and various other experiments. The center will also provide comprehensive educational programs for nuclear newcomers. Its main programs include: a well designed educational program, customized training courses, and on-the-job training. This paper will discuss the current status of the ITC and describe practical plans for solving current security issues in Korea. (authors)

  9. Bibliography on peace, security, and international conflict management

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    This bibliography presents an annotated list of approximately one hundred titles for public libraries seeking to serve the college-educated nonspecialist in the fields of peace, security, and international conflict management. representative titles have been selected in eight subject areas: (1) arms control, disarmament, and proliferation; (2) causes and nature of international conflict; (3) conflict management, diplomacy, and negotiation; (4) human rights and ethnic and religious conflicts; (5) international law and international order; (6) international organizations and transnationalism; (7) other approaches to, and overviews of, security and peace; and (8) religion and ethics. Three criteria determined selection of titles: the book is in print and is expected to remain in print for the foreseeable future; the book is of interest to the college-educated lay reader with a serious interest in the subject; and the list, as a whole, illustrates the full spectrum of debate, both in selection of topics and selection of titles. As an aid to the identification and acquisition of any of these materials, the editors have provided a bibliographic citation with an annotation that includes the following: author, title, statement of responsibility, publisher, publication information, pagination, and ISBN or ISSN

  10. Bibliography on peace, security, and international conflict management

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    This bibliography presents an annotated list of approximately one hundred titles for public libraries seeking to serve the college-educated nonspecialist in the fields of peace, security, and international conflict management. representative titles have been selected in eight subject areas: (1) arms control, disarmament, and proliferation; (2) causes and nature of international conflict; (3) conflict management, diplomacy, and negotiation; (4) human rights and ethnic and religious conflicts; (5) international law and international order; (6) international organizations and transnationalism; (7) other approaches to, and overviews of, security and peace; and (8) religion and ethics. Three criteria determined selection of titles: the book is in print and is expected to remain in print for the foreseeable future; the book is of interest to the college-educated lay reader with a serious interest in the subject; and the list, as a whole, illustrates the full spectrum of debate, both in selection of topics and selection of titles. As an aid to the identification and acquisition of any of these materials, the editors have provided a bibliographic citation with an annotation that includes the following: author, title, statement of responsibility, publisher, publication information, pagination, and ISBN or ISSN.

  11. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part

  12. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  13. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    incoming SSP Directors. Among other notables who have called Belmont home are Vannevar Bush, Winslow Homer, Talcott Parsons , the John Birch Society...Researchers 15 Affiliates 26 Seminar Series 33 Special Events 34 Field Trip 36 Publications 41 SSP Teaching 42 Courses 48 Professional Education 50 SSP...STUDIES PROGRAM MIT SECURITY STUDIES PROGRAM SECURITY STUDIES PROGRAM 1 he Security Studies Program (SSP) is a graduate level research and educational

  14. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  15. Report on International Roundtable Meeting on Collection Security held at the British Library

    Directory of Open Access Journals (Sweden)

    Andy Stephens

    2008-09-01

    Full Text Available Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1 perpetrator profiling; 2 relations with the criminal justice system; 3 systems; 4 looking out; 5 aftermath.

  16. Cities and Water Security in the Anthropocene: Research Challenges and Opportunities for International Relations

    Directory of Open Access Journals (Sweden)

    Joana Castro Pereira

    Full Text Available Abstract Cities have become important actors in international relations, and integral to security and environmental politics. We are living in an increasingly urban world, dominated by human settlements and activities. The central role now played by humans in shaping the planet has led us into an uncertain, unstable, and dangerous geological epoch – the Anthropocene – that poses great and additional challenges to security. Local and global spheres are connected as never before, generating ‘glocal’ issues in which water plays a central role. Water is the element that interconnects the complex web of food, energy, climate, economic growth, and human security. In a rapidly urbanising world, cities influence the hydrological cycle in major but uncertain ways, affecting water resources beyond their boundaries. There is no doubt that these issues are highly relevant to the discipline of International Relations (IR. However, IR scholars have been slow to engage with them, and most academic studies of cities and water security still emanate from the natural sciences. This article examines the ways in which cities in the Anthropocene challenge water security, and why IR needs to reinvent itself if it wants to sustain its contribution to global security.

  17. 78 FR 49311 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2013-08-13

    ... Organizations; International Securities Exchange, LLC; Order Approving Proposed Rule Change Related to Market... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange...'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change related to market maker risk parameters and...

  18. 76 FR 47630 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-05

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Market Data Fees August 1, 2011. Pursuant to Section 19(b)(1) of the Securities... 1, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the...

  19. 76 FR 51075 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval to...

    Science.gov (United States)

    2011-08-17

    ... Organizations; International Securities Exchange, LLC; Order Granting Approval to a Proposed Rule Change Relating to Appointments to Competitive Market Makers August 11, 2011. I. Introduction On June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities...

  20. 76 FR 32382 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-06-06

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Second Market Fees May 27, 2011. Pursuant to Section 19(b)(1) of the Securities..., 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the...

  1. 76 FR 37863 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-06-28

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to Appointments to Competitive Market Makers June 22, 2011. Pursuant to Section 19(b)(1) of the Securities... that on June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  2. Forecast Of International Security Threat Of Russia In 2017

    Directory of Open Access Journals (Sweden)

    A. O. Bezrukov

    2017-01-01

    Full Text Available The article analyzes the threats to international security of Russia in 2017. It presents the analysis of the twelve situations, the development of which could have a significant effect on the interests of Russia in the field of international security. There is the most probable scenario for every situation and a list of conditions of its occurrence. The objective of the forecast is reduction of uncertainty of the future and the promotion of reasonable hypotheses about its likely scenarios. The forecast task is to help decision-makers, mentally put yourself in a situation in which realized one of the scenarios for the future and to encourage them to calculate their possible actions. In the preparation of the forecast two scenario analysis tools were used: the allocation of two key variables, the ratio of which determines the spectrum of the analyzed scenarios, and the key events method, which consists of several stages and allows to evaluate the prospect of implementing the scenario observed in real time. Authors conclude that the USA with the new president will be forced to choose between maintaining global posture and keeping order at home, and the EU will be absorbed by internal issues. In 2017 for Russia is important to keep the positive dynamics in the Transatlantic and Grand Eurasia regions, and in the Middle East. For this purpose it is necessary to ignore the provocations – mainly in Europe. The source of a new crisis may be NATO members discouraged by lack of attention to them by the USA or allies of Russia.

  3. Exploring propositions about perceptions of energy security: An international survey

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Valentine, Scott Victor; Jain Bambawale, Malavika; Brown, Marilyn A.; Fátima Cardoso, Terezinha de; Nurbek, Sayasat; Suleimenova, Gulimzhan; Li Jinke; Xu Yang; Jain, Anil; Alhajji, A.F.; Zubiri, Andrew

    2012-01-01

    This study investigates how energy users from government, industry, civil society, and academia perceive of energy security challenges. It also analyzes how demographic characteristics influence such perceptions, and how geography, economic structure, modes of domestic energy production, and culture shape energy security priorities. Its primary source of data is a four-part survey distributed in seven languages (English, Mandarin, Portuguese, Russian, Arabic, German, and Japanese) to 2167 respondents in Brazil, China, Germany, India, Kazakhstan, Japan, Papua New Guinea, Saudi Arabia, Singapore, and the United States. These countries were selected because they represent a mix of urban and rural populations, developed and developing economies, import- and export-oriented energy trading flows, communist and capitalist societies, liberalized and state-owned energy markets, and small and large geographic sizes. The survey results are used to test four propositions about energy security related to the education, age, occupation, and gender of respondents, as well five propositions about national energy priorities and the interconnected attributes of security of supply, energy efficiency, energy research and development, energy trade, diversification and decentralization, affordability, environmental quality, climate change, and energy governance.

  4. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  5. Trends in International Security and Trade (Trade Experts’ Roundtable, 2017

    Directory of Open Access Journals (Sweden)

    Elinor Sloan

    2017-08-01

    Full Text Available With so many trouble spots in the world, it can be difficult for Canadian businesses to know where to trade successfully and with some assurance of security. Canadian government organizations affiliated with Global Affairs Canada (GAC need to take a broader view of international security, rather than assessing states in isolation, if businesses are to have the vital information they need. Multinational firms typically have their own risk-management strategies, but smaller enterprises need outside help to get information on the safety and viability of potential export markets. However, none of these GAC-affiliated organizations examines the security risks inherent in the interactions between countries. While GAC focuses mainly on economics, tariffs, language barriers and other factors, the Crown corporation Export Development Canada (EDC does risk assessments of various countries to determine what level of political risk insurance it should offer to Canadian companies. The Business Development Bank, best known for its domestic work with Canadian businesses, has branched out into the foreign realm too, but only in terms of industry and market research on export assessments. Based on long-term GDP projections, some interesting forecasts have been made that will affect how and where Canadian businesses trade internationally. They will need accurate information on risk and security in order to do so. By 2030, the four largest world economies will be those of the U.S., China, India and Japan. For now, the best bets for Canadian businesses in the short to medium term include China, India and some Southeast Asian countries, although there are some accompanying dangers in these areas. Pakistan, Nigeria and Egypt have the potential to be good markets for Canadian exports, but the current risk from terrorist activity precludes foreign commercial interests. The unstable relationships between countries in the world’s hotspots need continuing assessment and

  6. Border Security: Barriers Along the U.S. International Border

    Science.gov (United States)

    2009-03-16

    Nogales, AZ; Naco , AZ; Douglas, AZ; and El Paso, TX. In 1996, Congress passed the Illegal Immigration Reform and Immigrant Responsibility Act... Naco , AZ; Douglas, AZ; and El Paso, TX.80 In a 1999 study which was commissioned by the INS and performed under a Memorandum of Understanding, the...Naturalization Service, Final Environmental Assessment U.S. Border Patrol Temporary Vehicle Barriers Naco and Douglas, Arizona, November 2002. Border Security

  7. The EU Security Continuum: the interaction between internal and external spheres in

    Directory of Open Access Journals (Sweden)

    Ana Postolache

    2012-08-01

    Full Text Available Exceeding the traditional dividing line between internal and external security, the article aims to analyze the coordination link between EU internal and external spheres in combating the "new security threats" and in achieving its security goals. First, I will analyze the rapprochement steps towards the EU security continuum, the instruments and the logic behind the process. Second, I will step beyond the discursive claims and I will analyze the EU operational aspects directed under this umbrella, with a particular focus on organised crime. Last but not least, I will discuss the reflection of EU security continuum on the wider global security arena.

  8. Management of Global Nuclear Materials for International Security

    International Nuclear Information System (INIS)

    Isaacs, T; Choi, J-S

    2003-01-01

    Nuclear materials were first used to end the World War II. They were produced and maintained during the cold war for global security reasons. In the succeeding 50 years since the Atoms for Peace Initiative, nuclear materials were produced and used in global civilian reactors and fuel cycles intended for peaceful purposes. The Nonproliferation Treaty (NPT) of 1970 established a framework for appropriate applications of both defense and civilian nuclear activities by nuclear weapons states and non-nuclear weapons states. As global inventories of nuclear materials continue to grow, in a diverse and dynamically changing manner, it is time to evaluate current and future trends and needed actions: what are the current circumstances, what has been done to date, what has worked and what hasn't? The aim is to identify mutually reinforcing programmatic directions, leading to global partnerships that measurably enhance international security. Essential elements are material protection, control and accountability (MPC and A) of separated nuclear materials, interim storage, and geologic repositories for all nuclear materials destined for final disposal. Cooperation among key partners, such as the MPC and A program between the U.S. and Russia for nuclear materials from dismantled weapons, is necessary for interim storage and final disposal of nuclear materials. Such cooperative partnerships can lead to a new nuclear regime where a complete fuel cycle service with fuel leasing and spent fuel take-back can be offered to reactor users. The service can effectively minimize or even eliminate the incentive or rationale for the user-countries to develop their indigenous enrichment and reprocessing technologies. International cooperation, supported by governments of key countries can be best to facilitate the forum for formation of such cooperative partnerships

  9. Conceptualizing international education : From international student to international study

    NARCIS (Netherlands)

    Madge, Clare; Raghuram, Parvati; Noxolo, Pat

    2015-01-01

    In a rapidly changing transnational eduscape, it is timely to consider how best to conceptualize international education. Here we argue for a conceptual relocation from international student to international study as a means to bridge the diverse literatures on international education. International

  10. Complex Challenges, Comprehensive Responses - Linking Security and Development : 11th International Summer School 2007

    OpenAIRE

    Brockmann, Kathrin; Hauck, Hans Bastian

    2007-01-01

    "The link between international security and development constitutes a nexus that is only beginning to be understood and addressed by the international community and by regional security and development actors. During the International Summer School, participants and renowned speakers examine the complexity of contemporary development and security challenges, such as transnational warfare, terrorism, poor governance and state failure, migration and resource conflicts, as well as the transform...

  11. 2. Normative Strengthening of International Refugee Protection : Towards More Human Security

    OpenAIRE

    Ahlborn, Christiane

    2011-01-01

    After having linked massive flows of refugees with peace and security in the case of Iraq in the early 1990s, the Security Council has increasingly used situations related to international refugee protection to declare a threat to international peace and security, triggering measures under Chapter VII of the UN Charter. The practice that has subsequently developed addresses the root causes of mass displacement, as originally requested by the Expert Group on International Cooperation to avert ...

  12. Newsletter, School of International Graduate Studies (SIGS) / Vol. 7, Issue 2 / April 2008

    OpenAIRE

    2008-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  13. Newsletter, School of International Graduate Studies (SIGS) / Vol. 8, Issue 1 / January 2009

    OpenAIRE

    2009-01-01

    Newsletter, School of International Studies (SIGS), Global Center for Security Cooperation published by the Naval Postgraduate School's School of International Graduate Studies in Monterey, California. NA

  14. Hyper-connectivity : intricacies of national and international cyber securities

    OpenAIRE

    Dawson, Maurice

    2017-01-01

    This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for...

  15. International user studies

    DEFF Research Database (Denmark)

    Nielsen, Lene; Madsen, Sabine; Jensen, Iben

    in Sydhavnen, and it is funded by InfinIT. Based on a qualitative interview study with 15 user researchers from 11 different companies, we have investigated how companies collect and present data about users on international markets. Key findings are: Companies do not collect data about end users in all...... the countries/regions they operate in. Instead, they focus on a few strategic markets. International user studies tend to be large-scale studies that involve the effort of many both internal and external/local human resources. The studies typically cover 2-4 countries/regions and many end users in each country...... across nationalities and (2) that it often is more important to focus on and take differences in market conditions into account than national culture per se. Companies are in the process of finding out how best to present the insights about international end users to their employees. However, so far...

  16. Military Activities in the EEZ: A U.S.-China Dialogue on Security and International Law in the Maritime Commons (China Maritime Study, Number 7)

    Science.gov (United States)

    2010-12-01

    marine environment are not impaired, and for the rational use of this environment, in the service of human welfare, international equity and economic...interests or sources of authority.47 Since “freedom” is a broader genus than “right,” freedom of navigation may logically be said to trump some

  17. 75 FR 2915 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2010-01-19

    ...-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Market Data Fees January 8, 2010. I. Introduction On November 25, 2009, the International... subscription fees for the sale of three [[Page 2916

  18. Symposium on international safeguards: Verification and nuclear material security. Proceedings

    International Nuclear Information System (INIS)

    2001-01-01

    During the Symposium on International Safeguards, 18 sessions were devoted to reviewing all aspects of our verification activities and those related to the Security of Nuclear Material. It has been an occasion to highlight the most significant and rapid evolution of IAEA Safeguards, and the challenges it is facing: first the challenge in improving the effectiveness of 'traditional Safeguards'; the challenge in implementing the Additional Protocol in States where it is in force and in trying to expand the number of such States; the challenge in drawing and maintaining credible Safeguards conclusions; the challenge in designing and implementing Integrated Safeguards, including complementary access, managed access and unannounced inspections; the challenge in developing, testing, installing and maintaining new, more efficient and more reliable equipment such as surveillance cameras, seals and Remote Monitoring control; the challenge in developing new information and analytical tools including open sources and satellite imagery; the major challenge of recruiting and training new inspectors, with extremely broad skills to replace the most experienced inspectors who are retiring; and last but not least, the challenge of filling the widening gap between what is required and expected from this Agency and the human and Regular Budget resources available. The activities and progress related to the Trilateral Initiative and the support to nuclear disarmament efforts have also been discussed. And finally, the Agency's present and future activities relating to Physical Protection and Illicit Trafficking have been abundantly reviewed. Some disturbing and controversial views on Nuclear Terrorism were mentioned

  19. SYSTEMATIZATION OF INTERNATIONAL EXPERIENCE OF ENSURING ECONOMIC SECURITY OF EXACERBATION OF THE THREATS AND CHALLENGES OF A NEW TYPE FOR NATIONAL AND INTERNATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Tatyana Momot

    2016-11-01

    Full Text Available The aim of the work is to systematize the international experience of economic security both in terms of individual countries and the global economy as a whole. Setting such a goal it is associated with the growth of globalization and integration processes in the world economy, which are the new threat of economic security. Methods. Theoretical and methodological basis of the study were research and findings on issues of economic security at the level of the world economy as a whole and individual national economies in particular. We used such general scientific and special methods, such as analysis and synthesis, comparison, generalization, adaptation. The findings led to the conclusion that the protection of national interests and the formation of an economic security strategy – the most important functions of the state, the implementation of which is impossible without a system of self-regulation mechanisms and regulation. The government should implement a set of measures to promote economic growth, and that will guarantee the economic security of the country. These measures should cover all sectors of the economy. These measures include the implementation an active structural and social policies, enhancing the activity of the state in investment, financial, monetary and foreign economic sphere, the continuation of institutional reforms. The practical significance is to separate the differences used methodological approaches to ensure the economic security of the EU member countries and the CIS. This is explained by the fact that the first group of countries is focused on standards and borrows the experience of the leading EU countries (Germany, France, and the second group, located in the zone of influence of Russia (Moldova, Ukraine, Belarus, Kazakhstan, – on the Russian developments and standards. In turn, Russia in their design focuses more on standards to ensure economic security, which have been made in the period of the Soviet

  20. An analysis on international trends of radiation application and security of radioactive sources

    International Nuclear Information System (INIS)

    Ryu, J. S.; Yang, M. H.

    2003-01-01

    Radiation technologies are being utilized in a wide range of daily modern life and provide the public with valuable benefits through applications in fields of medical, industrial, agricultural, and science and engineering research. On the other hand, there is a high possibility that radioactive materials could be used for potentially malevolent purposes such as dirty bombs. International community, therefore, has made efforts to improve security of radioactive sources for protecting the public from radiological terrorism. This study investigated current status of radiation technologies and radioactive sources which could be used by radiological dispersal devices. This paper also reviewed the possibility of radiological weapon attacks, international trends and our methods to enhance security of radioactive sources

  1. 78 FR 68497 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-11-14

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Exchange Trading Days and Hours of Business and Trading Halts November 7, 2013... thereunder,\\2\\ notice is hereby given that, on October 31, 2013, the International Securities Exchange, LLC...

  2. 77 FR 76334 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-12-27

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate... Prices Until the Close of Trading on the Second Business Day Prior to Monthly Expiration in Unusual... December 19, 2012, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with...

  3. 78 FR 33461 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-06-04

    ...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... the Second Business Day Prior to Expiration in Unusual Market Conditions May 29, 2013. Pursuant to... is hereby given that, on May 20, 2013, Miami International Securities Exchange LLC (the ``Exchange...

  4. 76 FR 81005 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-12-27

    ..., political-military affairs, international security and related aspects of public diplomacy. The agenda for... STATE DEPARTMENT [Public Notice: 7718] International Security Advisory Board (ISAB) Meeting Notice.... 552b(c)(1), it has been determined that this Board meeting will be closed to the public in the interest...

  5. 76 FR 58076 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-09-19

    ... affairs, and international security and related aspects of public diplomacy. The agenda for this meeting... STATE DEPARTMENT [Public Notice: 7550] International Security Advisory Board (ISAB) Meeting Notice... been determined that this Board meeting will be closed to the public in the interest of national...

  6. 76 FR 47627 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-05

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Two Market Data Feeds August 1, 2011. Pursuant to Section 19(b)(1) of the... on August 1, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...

  7. 78 FR 7844 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-02-04

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Certain Market Maker Fees January 29, 2013. Pursuant to Section 19(b)(1) of the... on January 17, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  8. 78 FR 8675 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-02-06

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change to Amend ISE Rule 2102 to Extend the Market-Wide Circuit Breaker Pilot Program January... 19b-4 thereunder,\\2\\ notice is hereby given that, on January 29, 2013, International Securities...

  9. 77 FR 37722 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Eliminate the Rules and Fees Related to the Second Market June 18, 2012. Pursuant to...\\ notice is hereby given that on June 6, 2012, the International Securities Exchange, LLC (the ``Exchange...

  10. 78 FR 37870 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-06-24

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Related to Market Maker Risk Parameters and Complex Orders June 18, 2013. Pursuant to Section 19(b)(1) of the... on June 5, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...

  11. 78 FR 24271 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-24

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Market Maker Plus Rebate Program April 18, 2013. Pursuant to Section 19(b)(1... hereby given that on April 10, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the...

  12. 77 FR 1757 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-01-11

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options January 5, 2012...,\\2\\ notice is hereby given that on December 28, 2011, the International Securities Exchange, LLC (the...

  13. 78 FR 17988 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-25

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Regarding Market Maker Quoting Requirements March 19, 2013. Pursuant to Section 19(b)(1) of... given that on March 5, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  14. 75 FR 62900 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-13

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on October 4, 2010, International Securities...

  15. 78 FR 45580 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-07-29

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend Certain Market Maker Fees July 23, 2013. Pursuant to Section 19(b)(1) of the... hereby given that on July 11, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the...

  16. 76 FR 5412 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-01-31

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Establish a New Class of Market Participant for Index Options January 25, 2011. Pursuant to Section 19(b)(1) of... given that on January 12, 2011, International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  17. 77 FR 31680 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-05-29

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate May 22, 2012...-4 thereunder,\\2\\ notice is hereby given that on May 15, 2012, the International Securities Exchange...

  18. 76 FR 56832 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-09-14

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a New Market Data Feed September 8, 2011. Pursuant to Section 19(b)(1) of the... on August 31, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  19. 77 FR 37944 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-06-25

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Allow Competitive Market Makers To Use Their Membership Points To Enter Multiple Quotes in an Options Class June 19... 19b-4 thereunder,\\2\\ notice is hereby given that on June 6, 2012, the International Securities...

  20. 76 FR 61438 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Proposed Rule...

    Science.gov (United States)

    2011-10-04

    ... Organizations; International Securities Exchange, LLC; Notice of Proposed Rule Change Related to Trading Halts Due to Extraordinary Market Volatility September 28, 2011. Pursuant to Section 19(b)(1) of the... September 27, 2011, the International Securities Exchange, LLC (``Exchange'' or ``ISE'') filed with the...

  1. 76 FR 70178 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-11-10

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Market Data Fees November 3, 2011. Pursuant to Section 19(b)(1) of the... that, on October 24, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...

  2. 75 FR 42812 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-07-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options July 15, 2010..., \\2\\ notice is hereby given that on June 30, 2010, International Securities Exchange, LLC (``ISE'' or...

  3. 76 FR 64417 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-10-18

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Competitive Market Maker Trading Rights October 12, 2011. Pursuant to Section...\\ notice is hereby given that on October 3, 2011, the International Securities Exchange, LLC (the...

  4. 75 FR 71475 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-11-23

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Market Data Fees November 17, 2010. Pursuant to Section 19(b... hereby given that on November 4, 2010, the International Securities Exchange, LLC (the ``Exchange'' or...

  5. 78 FR 48742 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-08-09

    ...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate...\\ notice is hereby given that on July 23, 2013, Miami International Securities Exchange LLC (``Exchange... allocated Marketing Fees for orders directed to that LMM. The text of the proposed rule change is available...

  6. 77 FR 74905 - Self-Regulatory Organizations; Miami International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-12-18

    ...-Regulatory Organizations; Miami International Securities Exchange, LLC; Notice of Filing and Immediate...\\ notice is hereby given that on December 7, 2012, Miami International Securities Exchange LLC (``Exchange... provided by the MIAX. Marketing Fee MIAX will assess a Marketing Fee to all MIAX Market Makers for...

  7. 77 FR 16883 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-03-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Add an Index..., 2012, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the... Max SPY. Options on the Max SPY will be p.m. cash-settled and will have European-style exercise...

  8. 78 FR 17733 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... given that on March 18, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE..., including exercise style. Accordingly, the Exchange noted in its Mini Options filing that Exchange rules...

  9. 75 FR 66410 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-10-28

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to the Sales Value Fee October 22, 2010. Pursuant to Section 19(b... hereby given that, on October 14, 2010, the International Securities Exchange, LLC (the ``Exchange'' or...

  10. Gender in International Conflict: Women Representation in Security Discourse

    OpenAIRE

    Fitriani, Fitriani

    2012-01-01

    Security discourse that was long cons idered as scientific, objective and gender neutral is one subject that had received numerous feminist critics. It is not only that feminist observed security discourse as minority – including women and victims – blind; it is also masculine and prostatus quo. This article reviews the building of security discourse from feminist perspective that detects, since the theoretical building to the practical level, women are given weak position to justified the st...

  11. IRIS International Reactor Innovative and Secure Final Technical Progress Report

    International Nuclear Information System (INIS)

    Carelli, M.D.

    2003-01-01

    OAK-B135 This NERI project, originally started as the Secure Transportable Autonomous Light Water Reactor (STAR-LW) and currently known as the International Reactor Innovative and Secure (IRIS) project, had the objective of investigating a novel type of water-cooled reactor to satisfy the Generation IV goals: fuel cycle sustainability, enhanced reliability and safety, and improved economics. The research objectives over the three-year (1999-2002) program were as follows: First year: Assess various design alternatives and establish main characteristics of a point design; Second year: Perform feasibility and engineering assessment of the selected design solutions; Third year: Complete reactor design and performance evaluation, including cost assessment These objectives were fully attained and actually they served to launch IRIS as a full fledged project for eventual commercial deployment. The program did not terminate in 2002 at the end of the NERI program, and has just entered in its fifth year. This has been made possible by the IRIS project participants which have grown from the original four member, two-countries team to the current twenty members, nine countries consortium. All the consortium members work under their own funding and it is estimated that the value of their in-kind contributions over the life of the project has been of the order of $30M. Currently, approximately 100 people worldwide are involved in the project. A very important constituency of the IRIS project is the academia: 7 universities from four countries are members of the consortium and five more US universities are associated via parallel NERI programs. To date, 97 students have worked or are working on IRIS; 59 IRIS-related graduate theses have been prepared or are in preparation, and 41 of these students have already graduated with M.S. (33) or Ph.D. (8) degrees. This ''final'' report (final only as far as the NERI program is concerned) summarizes the work performed in the first four

  12. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  13. Intrapreneurship - An International Study

    NARCIS (Netherlands)

    Bosma, N.S.; Stam, E.; Wennekers, A.R.M.

    2010-01-01

    This paper presents the first results of a novel international comparative study of intrapreneurship, i.e., employees developing new business activities for their employer. This study is based on an exploratory investigation in the framework of the Global Entrepreneurship Monitor 2008, in which

  14. Simulation in International Studies

    Science.gov (United States)

    Boyer, Mark A.

    2011-01-01

    Social scientists have long worked to replicate real-world phenomena in their research and teaching environments. Unlike our biophysical science colleagues, we are faced with an area of study that is not governed by the laws of physics and other more predictable relationships. As a result, social scientists, and international studies scholars more…

  15. Loneliness and International Students: An Australian Study

    Science.gov (United States)

    Sawir, Erlenawati; Marginson, Simon; Deumert, Ana; Nyland, Chris; Ramia, Gaby

    2008-01-01

    In a study of international student security, consisting of 200 intensive interviews with students, resident onshore in Australia, it was found that two thirds of the group had experienced problems of loneliness and/or isolation, especially in the early months. According to Weiss, students experience both "personal loneliness" because of…

  16. Solutions for a food-secure future | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-05

    Oct 5, 2016 ... Agriculture and food security: Investing in solutions that work. woman cutting wheat in Ethiopia. Improving food security and nutrition through research. Through partnerships, IDRC is helping build more effective agricultural systems, produce more nutritious food, and create economic opportunities for ...

  17. Security in Africa: The big picture | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-23

    Feb 23, 2011 ... He concluded by arguing that the major security challenge facing Africa is the management of its urban spaces, and he highlighted flashpoints such as the large numbers of unemployed and poorly educated young men, urban gangs, and private security firms. Listen to Jakkie Cilliers on governance in ...

  18. Canadian International Food Security Research Fund - Phase II ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... productive, and environmentally sustainable agri-food systems that increase food security and enhance nutrition in developing countries; -increase food security in developing countries by funding applied agricultural development and nutrition research; -apply Canadian science and technology expertise in collaboration ...

  19. [Internal migration studies].

    Science.gov (United States)

    Stpiczynski, T

    1986-10-01

    Recent research on internal migration in Poland is reviewed. The basic sources of data, consisting of censuses or surveys, are first described. The author discusses the relationship between migration studies and other sectors of the national economy, and particularly the relationship between migration and income.

  20. NATO Intervention in Kosovo in light of Security Council Actions and International Law

    Directory of Open Access Journals (Sweden)

    MA. Arben Salihu

    2013-12-01

    Full Text Available The horrors of World War Two made it universally clear that the world cannot progress without general respect for human rights. Still, the need for humanitarian intervention arose several times before 1999, but international political and military organisations including the UN, were either late or hesitant to prevent genocides or other related human catastrophes worldwide. The NATO intervention in Kosovo, however, marked the beginning of the new era in international relations. The facet of this intervention in view of legality is the topic of this paper. The aim of this study, above all, is to analyze the Security Council actions, debates and resolutions concerning situation in Kosovo, and the level of impact that the military operation had in international law (in particular and international relations (in general.  The study uses many authentic documents issued by the United Nations Security Council itself and other material related to the theme in order to develop an argument on the points raised. Throughout, this research paper has attempted to answer numerous issues related to the topic and offer a balanced view on the all the themes examined. Several but distinct points raised focus on relevant core subjects, discuss the challenges and opportunities of the humanitarian intervention and offer recommendations regarding the future of such operation for the well being of the humanity.

  1. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  2. Human Rights and Internal Security in Malaysia: Rhetoric and Reality

    National Research Council Canada - National Science Library

    Rahim, Noor H

    2006-01-01

    .... Since the safety of the public lies in the hands of the government, measures have been taken to ensure the nation's stability and security, including restriction on civil and political liberties...

  3. THE FAILURE OF COLLECTIVE SECURITY IN THE POST WORLD WARS I AND II INTERNATIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSEPH C. EBEGBULEM

    2012-05-01

    Full Text Available The League of Nations and the United Nations Organization were two post-World War (World War I and World War II organizations established for the maintenance of peace and security in the international system. One of the cardinal objectives of these organizations was the promotion of a Collective Security System which was considered as vital in the pursuit of global peace and security. In other words, Collective Security is an institutional mechanism established to address a comprehensive list of major threats to peace and security around the world. With the escalation of conflicts and wars in different parts of the world, there is therefore the need for collective responses at global, regional and national levels in conflict situations. The achievement of collective security in the international system would be based on the principle that any attack on any member of the United Nations would be considered as an attack on all the members. After a panoramic discourse of the meaning and nature of Collective Security, the paper also examines the problems of collective security in the international system; its failure under the League of Nations and the United Nations. The paper concludes that the weaknesses inherent in the system do not make it unuseful as it is a relevant factor in the maintenance of international peace and security.

  4. The EU's cybercrime and cyber-security rulemaking: mapping the internal and external dimensions of EU security

    NARCIS (Netherlands)

    Fahey, E.

    2014-01-01

    By taking the EU Cyber Strategy as a case in point, this contribution examines how the distinction between external and internal security in contemporary EU law manifests itself in large-scale risk regulation and in particular, how the EU relies upon external norms to regulate risk. This article

  5. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  6. Comparative study of Usability of Two Patterns for Developing an Emergency Scenario recommended by International Standard Organization and Homeland Security Exercise Evaluation Program

    Directory of Open Access Journals (Sweden)

    Sajad Farhadi

    2016-06-01

    Full Text Available Introduction: A systematic approach is needed for effective coping an incident. In such a system, the preparedness is the top priority. The organization’s readiness depends on some factors, including regular exercises. To conduct a proper exercise it is necessary to have a comprehensive scenario. Despite of repetitive execution of exercises, there is no commonly accepted template for it. The present study aims at selecting preferred method for developing an emergency exercise. Methods: In the present study, ISO 22398 and HSEEP as the two common patterns were compared through quantifying their usability and chosen by AHP. A panel of crisis experts scored the usability criteria of methods and selected the preferred method. Results: The assessment of usability of both patterns revealed the preference of ISO pattern in comparison with the HSEEP pattern. The HSEEP method had the better score in learnability and satisfaction, but, the effectiveness, efficiency and total score were higher for ISO 22398. Conclusion: To develop an emergency scenario, it is necessary to follow a suitable pattern. The pattern presented by ISO 22398 is more usable in comparison with HSEEP paten.

  7. 3. Normative Erosion of International Refugee Protection: Back to State Security

    OpenAIRE

    Ahlborn, Christiane

    2011-01-01

    Since the early 1990s the Security Council has used its enforcement measures under Chapter VII to strengthen different aspects of international refugee protection. It has addressed the root causes of forced displacement, supported the assistance to and protection of refugees and IDPs in on-going conflict situations and promoted durable solutions. However, apart from these positive normative effects on the security of refugees and displaced persons, the Security Council has also been criticize...

  8. A dynamic mathematical test of international property securities bubbles and crashes

    Science.gov (United States)

    Hui, Eddie C. M.; Zheng, Xian; Wang, Hui

    2010-04-01

    This study investigates property securities bubbles and crashes by using a dynamic mathematical methodology developed from the previous research (Watanabe et al. 2007a, b [31,32]). The improved model is used to detect the bubble and crash periods in five international countries/cities (namely, United States, United Kingdom, Japan, Hong Kong and Singapore) from Jan, 2000 to Oct, 2008. By this model definition, we are able to detect the beginning of each bubble period even before it bursts. Meanwhile, the empirical results show that most of property securities markets experienced bubble periods between 2003 and 2007, and crashes happened in Apr 2008 triggered by the Subprime Mortgage Crisis of US. In contrast, Japan suffered the shortest bubble period and no evidence has documented the existence of crash there.

  9. 76 FR 36167 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-06-21

    ... security and related aspects of public diplomacy. The agenda for this meeting will include classified... DEPARTMENT OF STATE [Public Notice: 7472] International Security Advisory Board (ISAB) Meeting... determined that this Board meeting will be closed to the public in the interest of national defense and...

  10. 78 FR 66984 - International Security Advisory Board (ISAB); Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-11-07

    ... security, and related aspects of public diplomacy. The agenda for this meeting will include classified... DEPARTMENT OF STATE [Public Notice 8514] International Security Advisory Board (ISAB); Meeting... been determined that this Board meeting will be closed to the public because the Board will be...

  11. The EU as a Promoter of Preventive Criminal Justice and the Internal Security Context

    NARCIS (Netherlands)

    Herlin Karnell, S.E.M.

    2015-01-01

    This paper discusses the current tendency in the EU to promote a criminal justice model focusing on prevention. In doing so, I examine the EU’s internal security agenda with regard to criminal law and assess the extent to which this strategy fits the picture of an European Area of Freedom, Security

  12. NINJA: a noninvasive framework for internal computer security hardening

    Science.gov (United States)

    Allen, Thomas G.; Thomson, Steve

    2004-07-01

    Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive

  13. 77 FR 21142 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2012-04-09

    ... and related aspects of public diplomacy. The agenda for this meeting will include classified... STATE DEPARTMENT [Public Notice 7815] International Security Advisory Board (ISAB) Meeting Notice... has been determined that [[Page 21143

  14. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  15. [Experience of international cooperation among Baltic countries in occupational health and security].

    Science.gov (United States)

    Miloutka, E V; Andronova, E R; Dedkova, L E

    2013-01-01

    The article covers longstanding experience of international cooperation in occupational health and security with Baltic countries. The authors describe history of information network creation, its structure, objectives, importance for occupational health services and safety in the region.

  16. The National Security Strategy Under the United Nations and International Law

    National Research Council Canada - National Science Library

    Kenney, Steven

    2004-01-01

    In response to an international order of growing terrorism trans-national crime "rogue" and "failed" states potentially armed with WMD and will to use them, the National Security Strategy has invoked...

  17. UN Security Council Practice and the Search for International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2014-01-01

    of international law including the use of chemical weapons, massacres, torture, sexual violence, unlawful killings and an array of other war crimes and crimes against humanity. With egregious violations of international law apparent, and an enormous and growing refugee crisis, the gaze of the international...

  18. International Organizations and the Area of Freedom, Security and Justice

    NARCIS (Netherlands)

    Matera, Claudio; Trauner, Florian; Ripoll Servent, Ariadna

    2017-01-01

    The Area of Freedom, Security and Justice (AFSJ) is possibly one of the most challenging fields of EU competences. Indeed, the integration into an AFSJ directly affects three fundamental aspects of constitutional relevance: the residual extent of national sovereignty, the monopoly of the state to

  19. The Politics of International Terrorism in the Security Complexes in ...

    African Journals Online (AJOL)

    sulaiman.adebowale

    2006-06-13

    Jun 13, 2006 ... able definition continues to pre-occupy politicians, lawyers, adminis- trators and academia. National .... emphasis on power, power relations, security and actors, the article at- tempts to unveil a new outlook ..... ment was determined to hit hard at Uganda's new administration. The situation only cooled after ...

  20. Defense Horizons. Cyber Influence and International Security. Number 61

    National Research Council Canada - National Science Library

    Kramer, Franklin D; Wentz, Larry

    2008-01-01

    .... Impediments to American cyber influence include the vastness and complexity of the international information environment, multiplicity of cultures and differing audiences to which communications must...

  1. The security of supply and the international political problems

    International Nuclear Information System (INIS)

    Petit, A.

    1981-01-01

    The paper deals with the problem of security of supply of electronuclear programs, especially under their political aspects. After a brief summary of the main historical events related to the subject: post-war position, Non Proliferation Treaty signature, London guidelines etc., the author underlines the fact that up to now, four countries only have been completely independent for their supplies. The elements of such independence are recalled as well as the special viewpoints of developing countries on the one hand, industrialized countries on the other hand. The final part analyses the means of reestablishing or reinforcing this security of supply. The classical commercial aspects such as preference for domestic producers, diversification of supplies and stockpiling are dealt with as well as with aspects more specific to nuclear energy, a technical one such as the possibility of developing breeders, and political ones, such as freedom to reexport, freedom to use imported materials in the frame of peaceful uses. (AF)

  2. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  3. Small Arms and Small Countries: Firearms and the International Security Agenda

    Directory of Open Access Journals (Sweden)

    Carla Álvarez Velasco

    2016-05-01

    Full Text Available This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. This was due to the pressure of small countries that were engulfed in violence at the hands of non-state actors in the post-Cold War era. At the regional level in Latin America, although important sub-regional differences exist, various regional initiatives have become an important example for other nations around the globe. In actuality however the positive achievements that securitization initially promoted has decreased. The study of this case leaves us with some relevant lessons both for theoretical reflection as well as for political action.

  4. A New KFOR: Changes for International Security in Kosovo

    National Research Council Canada - National Science Library

    Honzak, Rudolf

    2006-01-01

    .... "UNMIK's structure and mandate have been exposed as inappropriate to prepare Kosovo for the transition from war to peace from socialism to the market economy and from international political limbo to final status...

  5. The "Global" Homeland: International Perspectives on Counterterrorism and Homeland Security

    National Research Council Canada - National Science Library

    Tussing, Bert

    2004-01-01

    .... Yet, we are not in this alone. Other nations, international organizations such as NATO and the European Union, and transnational law enforcement agencies such as Europol and Interpol are deeply committed to the counter terror effort...

  6. 75 FR 42802 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-07-22

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate for Adding...''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on June 28, 2010, the International...

  7. 78 FR 21677 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-11

    ... (``PHLX'') and the International Stock Exchange LLC (``ISE''). For example, PHLX and ISE offer market data...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Establish Fees for the MIAX Top of Market (ToM) Data Product April 5...

  8. 76 FR 1488 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-01-10

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 28, 2010, the International...

  9. 75 FR 2913 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-01-19

    ...-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Market Maker Incentive Plan for Foreign Currency Options...\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 31, 2009, the International...

  10. 75 FR 34499 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-06-17

    ... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend the Qualification Standards for Market Makers To Receive a Rebate for Adding...\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on May 26, 2010, the International...

  11. American Security and the International Energy Situation. Volume 2. World Energy and the Security of Supply

    Science.gov (United States)

    1975-04-15

    e.a.ionsh.p between o,, Sports and national security I. still hotly debated. of fh.b?!’ ’?? •""’"P1«. the Special Report, " of^the Council...l.tr....* a VMr t0 produce . b,üepr.nt )or |ti ^^^^ 90.1. .„d when ,h.t document app„red „ ^^ clMr ^^ ^^.^ ^ r.ft of th. ,«,„ of

  12. Roles for international military medical services in stability operations (security sector reform).

    Science.gov (United States)

    Bricknell, M C M; Thompson, D

    2007-06-01

    This is the second in a series of three papers that examine the role of international military medical services in stability operations in unstable countries. The paper discusses security sector reform in general terms and highlights the interdependency of the armed forces, police, judiciary and penal systems in creating a 'secure environment'. The paper then looks at components of a local military medical system for a counter-insurgency campaign operating on interior lines and the contribution and challenges faced by the international military medical community in supporting the development of this system. Finally the paper highlights the importance of planning the medical support of the international military personnel who will be supporting wider aspects of security sector reform. The paper is based on background research and my personal experience as Medical Director in the Headquarters of the NATO International Stability Assistance Force in Afghanistan in 2006.

  13. Security+ study guide study guide and practice exam

    CERN Document Server

    Dubrawsky, Ido; Dubrawsky

    2007-01-01

    Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test preparation software for the edge you need to achieve certification on your first try! This system is comprehensive, affordable, and effective!* Completely Guaranteed Coverage of All Exam ObjectivesAll five Security+ domains are covered in full: General Securi

  14. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  15. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  16. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  17. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  18. CCNA Security Study Guide, Exam 640-553

    CERN Document Server

    Boyles, Tim

    2010-01-01

    A complete study guide for the new CCNA Security certification exam. In keeping with its status as the leading publisher of CCNA study guides, Sybex introduces the complete guide to the new CCNA security exam. The CCNA Security certification is the first step towards Cisco's new Cisco Certified Security Professional (CCSP) and Cisco Certified Internetworking Engineer-Security. With a foreword by CCNA networking authority Todd Lammle, CCNA Security Study Guide fully covers every exam objective. The companion CD includes the Sybex Test Engine, flashcards, and a PDF of the book.: The CCNA Securit

  19. Maintaining International Peace and Security: Reflections on Peace ...

    African Journals Online (AJOL)

    produced a dramatic growth in peacekeeping requirements since the end of the previous decade. The international response, mainly through the United Nations (UN), has been to promote preventive diplomacy and, in a number of cases, to conduct peace-support operations. In brief, this paper points out that each UN ...

  20. Examining the potential impacts of climate change on international security: EU-Africa partnership on climate change.

    Science.gov (United States)

    Dodo, Mahamat K

    2014-01-01

    Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many States are fragile and overwhelmed with mounting challenges. In recent years, the security implications of the climate change are being addressed from national, regional and multilateral level. Against this backdrop, this paper intends to contribute to the debate on climate change and international security and present a broader perspective on the discussion. The paper will draw from the EU-Africa partnership on climate change and is structured as follows: the first part introduces the background of the international climate change policy and its securitization, the second part covers the EU-Africa relations and EU-Africa partnership on climate change, and the third part discusses the Congo Basin Forest Partnership as a concrete example of EU-Africa Partnership on Climate Change. Lastly, the paper concludes by drawing some conclusions and offers some policy perspectives and recommendations. Q54; 055; 052; 01;

  1. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  2. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  3. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  4. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  5. Among cosmopolitan values and strategic interests: liberal and realist discourses of canada’s international security policy during post- cold war

    OpenAIRE

    Rodríguez M., Federmán

    2014-01-01

    The purpose of the article is to explain the liberal and realist discourses that underpinned the Canadian International Security Policy (CISP) during the post-Cold War. In particular, it offers evidence to show that Canadian governments inevitably debate between cosmopolitan values and strategic interests in formulating their respective policies of international security. After considering how liberal and realist orientations of this policy have been studied in the literature on CISP, it expl...

  6. Statement at NRC International Regulators Conference on Nuclear Security, 4 December 2012, Washington, United States

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    I would like to begin by thanking NRC Chairman Allison Macfarlane for hosting this first regulatory Conference on nuclear security involving regulators, law enforcement agencies and the IAEA. The United States has been a very important partner in the IAEA's nuclear security activities right from the start. It is by far the largest donor to our Nuclear Security Fund. It has actively supported our programmes and has been generous in providing funding, equipment and training to other Member States. When President Obama hosted the first Nuclear Security Summit in April 2010, he said it was important that that event should be part of a ''serious and sustained effort'' to improve nuclear security throughout the world. Since then, a growing number of governments have given high-level attention to this vitally important issue. This is very encouraging. Today, I am especially pleased to see regulators coming together to focus on this subject. I am confident that your meeting will make a valuable contribution to strengthening global nuclear security. I would like to share with you some important recent milestones in the IAEA's nuclear security work. As you know, primary responsibility for ensuring nuclear security lies with national governments. However, governments have recognized that international cooperation is vital. Terrorists and other criminals do not respect international borders and no country can respond effectively on its own to the threat which they pose. In September, our Member States - there are now 158 - reaffirmed the central role of the IAEA in e nsuring coordination of international activities in the field of nuclear security, while avoiding duplication and overlap . Our central role reflects the Agency's extensive membership, our mandate, our unique expertise and our long experience of providing technical assistance and specialist, practical guidance to countries. To put it simply, our work focuses on helping to minimize the risk of nuclear and other

  7. WMD Proliferation, Globalization, and International Security: Whither the Nexus and National Security?

    Science.gov (United States)

    2006-07-01

    potentially interact with global flows of technology and information transfers in order to gain access to destructive technologies more easily than...control the flow of people, technology , and money; • The growing importance of non-state actors as vehicles pushing global interdependence at the... technology throughout the international system supported in part by the Internet and the global revolution in information and communications

  8. Building International Genomics Collaboration for Global Health Security

    Directory of Open Access Journals (Sweden)

    Helen H Cui

    2015-12-01

    Full Text Available Genome science and technologies are transforming life sciences globally in many ways, and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement and installation of next generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.

  9. International Research and Studies Program

    Science.gov (United States)

    Office of Postsecondary Education, US Department of Education, 2012

    2012-01-01

    The International Research and Studies Program supports surveys, studies, and instructional materials development to improve and strengthen instruction in modern foreign languages, area studies, and other international fields. The purpose of the program is to improve and strengthen instruction in modern foreign languages, area studies and other…

  10. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2017-01-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  11. What Happened to the Nordic Model for International Peace and Security?

    DEFF Research Database (Denmark)

    Wivel, Anders

    2017-01-01

    The Nordic countries have long been renowned for their contribution to international peace and security. This contribution – occasionally viewed by both Nordic and non-Nordic policy-makers and academics as a particular model for facilitating peace and development in international affairs – is based...... internationalist peacemakers. This article identifies the characteristics of the Nordic model for international peace and security and discusses how and why it has changed....... on a combination of active contributions to peaceful conflict resolution, a high level of development aid and a continuous commitment to strengthening international society. However, recently Scandinavians have been making headlines for reasons that seem to contrast with their well-established brand as humane...

  12. THE FOOD RUSH. A SECURITY RISK AND A CAUSE FOR INTERNATIONAL INTERVENTION

    Directory of Open Access Journals (Sweden)

    Liliana FILIP

    2017-04-01

    Full Text Available Access to food is more than ever a question of interest. The world needs to produce at least 50% more food to feed 9 billion people by 2050. The land, biodiversity, oceans, forests, and other forms of natural capital are being depleted at unprecedented rates. Unless we change how we grow our food and manage our natural capital, food security – especially for the world’s poorest – will be at risk. In this context we expect that the struggle for food to generate migration, conflicts and, why not, international intervention defined by the new Copenhagen School of Security Studies paradigm. Since March 2008 governments, UN agencies and many social movements have adopted positions on the causes of the food crisis and the means to address it. Unfortunately, while these parties are trying to coordinate their activities and suggest new approaches, the old recipes for producing more food are often brought up. Contradictory proposals are made and the thought given to the causes underlying hunger and the food crisis (social, economic and political discrimination and exclusion has gone largely unheeded. The first Millennium Development Goal, which called for cutting the percentage of hungry people by half by 2015, is clearly out of reach. But the food crisis might lead to a new world food order.

  13. Conceptual proposals for measuring the impact of international regimes on energy security

    International Nuclear Information System (INIS)

    Sander, Michael

    2013-01-01

    The paper proposes two concepts to assess the effect of international regimes on energy security. Existing indicators focus mainly on state-level factors, excluding international influences. International relation scholars on the other hand see a clear connection between international regimes and stable energy relations. International regimes stabilise energy relations by providing frameworks for negotiations, defining, controlling and sanctioning compliance and allowing the actors to engage in package deals. The researcher needs to include these factors in a complete assessment of political energy security risks. As first step, the paper uses the effectiveness of control mechanisms as basis for such consideration. It refers specifically to international arbitration as the most important control mechanism in international energy relations. The simplest measurement option is the share of a county's energy imports covered by a certain regime. The paper applies the Oslo-Potsdam-Solution to account for outcome effectiveness. It applies a variant of the International Regimes Data Base protocol to account for effective regime structures. In a last section, the paper proposes some possible paths for future research. - Highlights: • International regimes mitigate political risks for energy supply and must be considered. • The paper proposes two concepts to measure energy regime effectiveness. • The OPS-variant measures output, the IRDB-variant measures structure effectiveness. • The paper offers a preliminary feasibility test for the concepts. • Finally, it suggests further roads for research

  14. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  15. 78 FR 41183 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-07-09

    ... aspects of public diplomacy. The agenda for this meeting will include classified discussions related to... DEPARTMENT OF STATE [Public Notice 8375] International Security Advisory Board (ISAB) Meeting... has been determined that this Board meeting will be closed to the public because the Board will be...

  16. 77 FR 47162 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2012-08-07

    ... aspects of public diplomacy. The agenda for this meeting will include classified discussions related to... DEPARTMENT OF STATE [Public Notice 7970] International Security Advisory Board (ISAB) Meeting... been determined that this Board meeting will be closed to the public because the Board will be...

  17. Predicting Preschoolers' Attachment Security from Fathers' Involvement, Internal Working Models, and Use of Social Support

    Science.gov (United States)

    Newland, Lisa A.; Coyl, Diana D.; Freeman, Harry

    2008-01-01

    Associations between preschoolers' attachment security, fathers' involvement (i.e. parenting behaviors and consistency) and fathering context (i.e. fathers' internal working models (IWMs) and use of social support) were examined in a subsample of 102 fathers, taken from a larger sample of 235 culturally diverse US families. The authors predicted…

  18. How can the West Better Assist Partner Nations in Establishing Internal Security

    Science.gov (United States)

    2017-03-31

    breakdown in internal security and is the framework used throughout this essay. Mary Kaldor, New and Old Wars: Organised Violence in a Global Era, 3rd...runs counter to the theses of both Smith and Kaldor but seems to be borne out by the recent behaviour of both Russia and China, which are flexing

  19. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    those decisions, and the politics that underpin them, take place. Moving beyond the peace versus justice debate, this work will examine the competing imperatives of international justice and the very modus operandi of the Security Council as it has evolved over time as a matter of custom and practice....

  20. 78 FR 78470 - Registration and Financial Security Requirements for Freight Forwarders; International...

    Science.gov (United States)

    2013-12-26

    ...). See, e.g., Motor Carrier Financial Information Reporting Requirements-Request for Public Comments, 68...] Registration and Financial Security Requirements for Freight Forwarders; International Association of Movers... FURTHER INFORMATION CONTACT: Mr. Thomas Yager, Chief of Driver and Carrier Operations, (202) 366-4001 or...

  1. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  2. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  3. The Analysis of the Chosen Internal Condition and Prospects of Romania’s Energy Security

    Directory of Open Access Journals (Sweden)

    Rutka Michał

    2017-03-01

    Full Text Available In the age of high pace of technological, economic and social development, stable and uninterrupted energy supply is one of the key components determining the economic sovereignty of the state, its position in international relations, and the quality of human life. Every economy around the world is heavily dependent on its energy sector. Consequently, ensuring energy security is currently one of the most important determinant of every country’s national security and the purpose of its security policy. In this article we focus on Romania’s energy security internal condition and prospects. Our main goal is to present actual state and prospects of Romanian energy sector. In order to achieve that goal, we decided to use various methods, such as descriptive analysis, document analysis and comparative analysis. The article has two parts. The first part consists of a description of energy sources and infrastructure used by Romanian economy. The second part is an analysis of possible chances and threats for both energy sector and energy security level.

  4. HUMAN RIGHTS AND INTERNATIONAL SECURITY. THE ROLE OF PRIVATE COMPANIES IN UNSTABLES ZONES

    Directory of Open Access Journals (Sweden)

    DANIEL SOTO MUÑOZ

    2018-01-01

    Full Text Available This article states that human rights have evolved from an state’s responsibility focused on the safekeeping of the public sphere to a preoccupation to safeguard the private space. This essay develops the discussion about the relevance of an international regulation to certify of given entrepreneurial processes and how they could help stability and international peace. It points out that many private enterprises and companies related to security issues, make relevant investments in fragile governability or in undergoing armed conflict zones, and the fact that their intervention may foster or diminish conflicts. The war scenarios present the most complex problems due to the general complexity of observing the International Humanitarian Law, as well as for the difficulty to repair damages due to private companies actions. Finally the article summarize the juridical discussion around “mercenarism” and the dilemma set by the regulation or the prohibition of the private military and security enterprises.

  5. Improvement of security techniques and protection of biometric data in biometric systems: Presentation of International Standard ISO 24745

    OpenAIRE

    Milinković, Milorad

    2017-01-01

    This paper presents the International Standard ISO 24745 as a potential security tool for biometric information protection, more precisely as a tool for privacy protection in biometric systems. This is one of the latest internationally accepted standards that address the security issues of biometric systems.

  6. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  7. 2nd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Cortesi, Agostino; Saeed, Khalid; Chaki, Nabendu

    2016-01-01

    The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

  8. Safety of radiation sources and security of radioactive materials. Proceedings of an international conference

    International Nuclear Information System (INIS)

    1999-01-01

    This International Conference, hosted by the Government of France and co-sponsored by the European Commission, the International Criminal Police Organization (Interpol) and the World Customs Organization (WCO), was the first one devoted to the safety of radiation sources and the security of radioactive materials and - for the first time - brought together radiation safety experts, regulators, and customs and police officers, who need to closely co-operate for solving the problem of illicit trafficking. The technical sessions reviewed the state of the art of twelve major topics, divided into two groups: the safety of radiation sources and the security of radioactive materials. The safety part comprised regulatory control, safety assessment techniques, engineering and managerial measures, lessons from experience, international cooperation through reporting systems and databases, verification of safety through inspection and the use of performance indicators for a regulatory programme. The security part comprised measures to prevent breaches in the security of radioactive materials, detection and identification techniques for illicit trafficking, response to detected cases and seized radioactive materials, strengthening awareness, training and exchange of information. The Conference was a success in fostering information exchange through the reviews of the state of the art and the frank and open discussions. It raised awareness of the need for Member States to ensure effective systems of control and for preventing, detecting and responding to illicit trafficking in radioactive materials. The Conference finished by recommending investigating whether international undertakings concerned with an effective operation of national systems for ensuring the safety of radiation sources and security of radioactive materials

  9. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  10. Strengthening the international legal framework for nuclear security: Better sooner rather than later

    International Nuclear Information System (INIS)

    Wetherall, Anthony C.

    2016-01-01

    In this 21. century global environment, the threat of terrorists or other criminals eventually acquiring and using radioactive material for malicious purposes or sabotaging such material or associated facilities, could be calculated as being an inevitable, albeit a preventable catastrophe. Much has been done to address this situation, such as the International Atomic Energy Agency (IAEA) now having a recognised central role in strengthening nuclear security globally. However, concerns still remain regarding the adequacy of the global nuclear security architecture, consisting of legally binding and non-binding instruments, intergovernmental organisations (IGOs), bodies and various initiatives, as well as internationally-accepted guidance and best practices, such as those reflected in the IAEA Nuclear Security Series of publications. Issues arise with respect to the adequacy of the international framework for nuclear security and the level of effective national implementation thereof. Highlighted in this regard, is a lack of universal adherence to the international nuclear security legal instruments, an absence of sustained information sharing (particularly on national implementation) and the non-existence of binding nuclear security standards and mandatory peer review and assessment. This article examines the framework's adequacy, its gaps and weak links, as well as the measures proposed to strengthen it. Part 1 considers some past and recent events, efforts, and developments that have contributed to the current status. Thereafter, the purported gaps and weak links and proposed strengthening measures are identified. While acknowledging progress, it is assumed that some overarching considerations, particularly national sovereignty, secrecy and complacency, continue to restrictively influence and determine the extent of state behaviour. Accordingly, these considerations are also briefly addressed in Part 1. Thereafter, Part 2 provides a concise overview of the

  11. Evaluating the United Nation’s Agenda for Atrocity Prevention: Prospects for the International Regulation of Internal Security

    Directory of Open Access Journals (Sweden)

    Cecilia Jacob

    2015-10-01

    Full Text Available In recent years the UN Secretary-General has promoted mass atrocity prevention as the priority agenda for the Responsibility to Protect (R2P at the UN, redirecting debates on R2P away from military interventionism towards improved state capacity to prevent atrocity crimes and protect populations. This focus has been illustrated in the UNSG’s annual reports on R2P since 2009, and the 2014 “Framework of Analysis for Atrocity Crimes”, that emphasise state institutional capacity and the identification of atrocity-risk indicators. Through a case-study of Pakistan, this article problematizes the relationship between internal security and the UN agenda on atrocity prevention to evaluate the viability of promoting atrocity prevention as currently conceived by the Office of the UNSG in high-risk contexts. It argues that an atrocity prevention agenda informed by a responsive regulation framework would be more effective in taking into account the relational dynamics of atrocity crimes. This includes accounting for the interaction between the micro-dynamics of political violence with macro-dynamics created by lengthy historical conflicts and strategic repertoires.

  12. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  13. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  14. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  15. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  16. Proceedings of the International Conference on IT Convergence and Security 2011

    CERN Document Server

    Ahn, Seong

    2012-01-01

    As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1.      Introduction of the most recent information technology and its related ideas 2.      Applications and problems related to t...

  17. The concept of “Comprehensive security” as a draft for reconstructing security in a system of international relations

    Directory of Open Access Journals (Sweden)

    MSc. Dritëro Arifi

    2011-03-01

    Full Text Available To explain how applicable the concept of "comprehensive secu-rity" is in Kosovo, at first, I will try to analyze the term of security, and development of international relations in relation to the phe-nomenon of "Security". Initially the term “security” is to be elabo-rated, in theoretical terms, the impact "national security" had du-ring the Cold War, and the development of the international rela-tions system, especially after "the fall of the Berlin Wall,” and the fall of communism. In the broadest sense, the post- modern securi-ty is characterized by many threats, such as terrorism, failing sta-tes, climate change etc. The elements of comprehensive security will be part of the analysis of developments in Kosovo after the war and briefly transformation of the security sector after inde-pendence.

  18. Norwegian security policy and the Norwegian armed forces in the 21st century : a case study of KFOR

    OpenAIRE

    Nissen, Sven Kristian

    2002-01-01

    Norwegian Security Policy and the Norwegian Armed Forces in the 21st century - a case study of KFOR (Summary) The subject of the study is Norwegian security policy and the Norwegian Armed Forces as an instrument for international operations, studied within the context of globalisation and substantial internal restructuring. Conducted as a case study of KFOR and by means of an inter-disciplinary approach, the objective is to carve out interesting hypothesis concerning the interacti...

  19. Collective Study On Security Threats In MANET

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2017-01-01

    Full Text Available In this paper the authors will be discussing the security issues in MANET amp the methods to protect it. Authors will be talk about related work in securing the network different type of attacks how to sense these sorts of attack what are the features of MANET then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested So that the users can use proper authentication techniques and network resources can be properly utilized.

  20. International legal instruments promoting synergy's in nuclear safety, security and safeguards: myth of reality?

    International Nuclear Information System (INIS)

    Vasmant, A.

    2009-01-01

    The purpose of this article is to assess the existing synergies between nuclear safety, nuclear security and non-proliferation/safeguards resulting from the adoption of international legal instruments. Keeping in mind that a synergy is the extra success achieved by two or more elements of a system working together instead of on their own, this paper will try to evaluate the possibility of a so-called '3 S' approach to optimize the benefits so defined. to achieve this, Part 1 focuses on the history of the three regimes and their major features, while Part 2, 3 and 4 explore the various benefits of, limits to, synergies between the nuclear safety, nuclear security and safeguards regimes. Part 5 describes the potential '3 S' approach in international nuclear law. (N.C.)

  1. International cooperation and security in the field of nuclear energy in Armenia

    International Nuclear Information System (INIS)

    Khachatryan, D.A.; Avagyan, A.A.; Stepanyan, V.E.

    2010-01-01

    In the report presented/discussed are the ecological-humanitarian disasters and the related policy of the international organizations, especially IAEA, NATO and others on ensuring security of vital activity of people in the sphere of energy and particularly nuclear energy. Possessing the only nuclear power station in Trans Caucasus and the store of toxic wastes of reactive fuel the Government of Armenia and the Ministry of Emergency Situations of the Republic of Armenia always take into consideration the many-sided aspects of prevention, warning about accident in energy buildings including nuclear accidents and modern response in case of occurring the latter ensuring security for ANPP personnel and the inhabitants of the settlements of the possible contingency zone. In their daily activity the workers of the Emergency Situations of the Republic of Armenia, especially those of the Armenian Rescue Service base on the experience and logistic support of international community some aspects of which are presented below

  2. Asia-Pacific Center for Security Studies Annual Report 2010

    Science.gov (United States)

    2010-01-01

    Studies2 Annual Repor t 2010 3 Building capacities and communities of interest by educating, connecting, and empowering security practitioners to...strategic understanding of complex challenges • Connector of communities of interest, expertise and influence related to security issues in the Asia-Pacific...long-term capacity building. A couple specific examples follow: 1. Mr. Maubere Loro Horta (Comprehensive Security Responses to Terrorism Course

  3. Theorizing the European union as Union as an International Security Provider

    DEFF Research Database (Denmark)

    This final paper will summarise the theoretical strands of the discussion in the preceding papers and reflect on the suitability of the analytical framework in the introduction in light of the empirical analysis by other contributors to the special issue. It will sketch out the main tenets...... of a theory of the EU as an international security provider and point to directions for further research in this area....

  4. Security Implications of Virtualization: A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2009-01-01

    Server virtualization is a key technology for today's data centers, allowing dedicated hardware to be turned into resources that can be used on demand.However, in spite of its important role, the overall security impact of virtualization is not well understood.To remedy this situation, we have

  5. MINIMIZATION OF IMPACTS PERTAINING TO EXTERNAL AND INTERNAL ENERGY SECURITY THREATS OF THERMAL POWER PLANTS

    Directory of Open Access Journals (Sweden)

    V. N. Nagornov

    2012-01-01

    Full Text Available The paper contains a classification of internal and external threats for thermal power plants and recommendations on minimization of these risks. A set of concrete measures aimed at ensuring TPP energy security has been presented in the paper. The system comprises preventive measures aimed at reducing the possibilities of emergence and implementation of internal and external threats. The system also presupposes to decrease susceptibility of fuel- and energy supply systems to the threats, and application of liquidation measures that ensure elimination of emergency situation consequences and restoration of the conditions concerning fuel- and power supply to consumers.

  6. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  7. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  8. Militarization of Energy Security: Turkey as a Case Study

    Science.gov (United States)

    2010-06-01

    Europeans responded by securing alternative routes and managing their existing stocks more carefully. The time period for interruption in both cases was...population centers84 had insightful psychological effects,85 the blockage of consignments to international recipients and increased insurance costs

  9. The Perspectives of International Regulation of Private Military and Security Companies

    Directory of Open Access Journals (Sweden)

    Maria A. Nebolsina

    2016-01-01

    Full Text Available Modern international security is a heterogeneous sphere that includes both state and nonstate actors. Legal status of some non-state actors is not always clear. This can be attributed mostly to the dynamics of the global processes. The emergence of new actors, their fast transformation and shift from old forms of activity to the new ones often outpace political and legal assessment of their nature, the impact on some other international trends and the implications of their use that may arise. States and international organizations together with business and non-governmental foundations have started to turn to private security actors more frequently. The fact that traditional methods of state violence are complemented by non-traditional forms influences the idea of violence in the society at large. The efficiency of non-state security actors and the speed they provide services with sometimes exceed the ones of civil servants' and outmaneuver state machine. However these advantages do not contribute to the legitimacy of these non-state actors. As a result during a certain period of time, sometimes a significant one, new actors perform having just a partial legitimacy and a vague accoun tability. Various approaches towards regulation of the abovementioned actors within the framework of national and regional legislation clarify their status in a way. But these measures are not enough for them to obtain legal status under the International Law so far. To address the problem a complex approach that would combine the existing International Law mechanisms with the developing self-regulation methods is needed.

  10. The Role of International Juridical Process in International Security and Civil-Military Relations

    Science.gov (United States)

    2002-12-01

    Court of Jerusalem in 1961, and the case of Klaus Barbie in France. Until today the application of international rules of war remains generally...227 By June 27, 2002 China, India, Pakistan, Indonesia, Iraq, and Turkey have failed to sign up to the 1998 Rome Treaty. The U.S., Egypt, Iran

  11. A study of institutional environment and household food security at ...

    African Journals Online (AJOL)

    The study looked into the current scenario of food security in Rwanda. After analysing the national level institutional and food security scenarios by using available secondary data, the researchers used primary data that have been collected from a random sample of 200 households spreading over six sectors of the Huye ...

  12. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  13. Linking Hydro-Meteorological Hazards, Climate and Food Security: an Initiative of International Scientific Community

    Science.gov (United States)

    Ismail-Zadeh, A.; Beer, T.

    2013-05-01

    Humans face climatic and hydro-meteorological hazards on different scales in time and space. In particular natural hazards can have disastrous impact in the short term (flood) and in the long term (drought) as they affect human life and health as well as impacting dramatically on the sustainable development of society. They represent a pending danger for vulnerable lifelines, infrastructure and the agricultural systems that depend on the water supply, reservoirs, pipelines, and power plants. Developed countries are affected, but the impact is disproportionate within the developing world. Extreme natural events such as extreme floods or prolonged drought can change the life and economic development of developing nations and stifle their development for decades. The beginning of the XX1st century has been marked by a significant number of natural disasters, such as floods, severe storms, wildfires, hurricanes, and tsunamis. Extreme natural events cause devastation resulting in loss of human life, large environmental damage, and partial or total loss of infrastructure that, in the longer time, will affect the potential for agricultural recovery. Recent catastrophic events of the early 21st century (e.g. floods in Pakistan and Thailand, the 2011 Tohoku earthquake and tsunami) remind us once again that there is a strong coupling between complex solid Earth, oceanic, and atmospheric processes and that even developed countries such as Japan are subject to agricultural declines as a result of disastrous hydro-meteorological events. Scientific community recognizes that communication between the groups of experts of various international organizations dealing with natural hazards and their activity in disaster risk reduction and food security needs to be strengthened. Several international scientific unions and intergovernmental institutions set up a consortium of experts to promote studies of weather, climate and their interaction with agriculture, food and their socio

  14. 76 FR 1065 - Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2011-01-07

    ...-AA87 Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI... officials at the 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in... 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in downtown Detroit...

  15. International Journal of Humanistic Studies

    African Journals Online (AJOL)

    International Journal of Humanistic Studies is an annual peer-reviewed Journal. It focuses on every aspect of Humanistic Studies and has a strong interdisciplinary thrust. Contributions are accepted from the fields of Philosophy, English Language, Literature, History, Theatre Arts, Music, Communication Arts, Anthropology, ...

  16. International Instructional Systems: Social Studies

    Science.gov (United States)

    Brant, Jacek; Chapman, Arthur; Isaacs, Tina

    2016-01-01

    This paper reports on research conducted as part of the International Instructional System Study that explored five subject areas across nine jurisdictions in six high-performing countries. The Study's overall aim was to understand what, if anything, there is in common in the curricula and assessment arrangements among the high-performing…

  17. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses. Addendum

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards ( including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  18. Symposium on international safeguards: Verification and nuclear material security. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-01-01

    The symposium covered the topics related to international safeguards, verification and nuclear materials security, namely: verification and nuclear material security; the NPT regime: progress and promises; the Additional Protocol as an important tool for the strengthening of the safeguards system; the nuclear threat and the nuclear threat initiative. Eighteen sessions dealt with the following subjects: the evolution of IAEA safeguards (including strengthened safeguards, present and future challenges; verification of correctness and completeness of initial declarations; implementation of the Additional Protocol, progress and experience; security of material; nuclear disarmament and ongoing monitoring and verification in Iraq; evolution of IAEA verification in relation to nuclear disarmament); integrated safeguards; physical protection and illicit trafficking; destructive analysis for safeguards; the additional protocol; innovative safeguards approaches; IAEA verification and nuclear disarmament; environmental sampling; safeguards experience; safeguards equipment; panel discussion on development of state systems of accountancy and control; information analysis in the strengthened safeguard system; satellite imagery and remote monitoring; emerging IAEA safeguards issues; verification technology for nuclear disarmament; the IAEA and the future of nuclear verification and security

  19. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    Science.gov (United States)

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance.

  20. International coalitions in Brazil’s foreign policy: security and governance reform

    Directory of Open Access Journals (Sweden)

    Alcides Costa Vaz

    2012-04-01

    Full Text Available The text analyses the relevance and role of international coalitions as instruments and arenas for negotiation in the context of Brazilian foreign policy under Luis Inácio Lula da Silva (2003-2010, and the perspectives they bring to the attainment of the goal of reforming the spaces and instruments of global governance in the political, economic and security spheres. Under Lula da Silva, Brazil supported and resorted intensively to coalitions not only for their instrumental value for consolidating the country’s international presence and actions, but also due to the possibility that they could induce systemic change towards a more uneven pattern of power distribution, thus helping to overcome lasting political and economic international asymmetries.

  1. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  2. 3rd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Saeed, Khalid; Cortesi, Agostino; Chaki, Nabendu

    2017-01-01

    This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

  3. International and Local Visions of the Justice and Security Sector in the West Bank

    Directory of Open Access Journals (Sweden)

    Ida Nafstad

    2018-03-01

    Full Text Available Considerable efforts by leading experts and funds from around the world are put into restructuring the West Bank justice and security sector (JSS. This is an effort done in a highly contested environment, with an ongoing Israeli occupation and weak local trust in the Palestine Authority (PA. This article analyzes the understandings by local Palestinian non-government organizations and international bodies aiding in building the JSS of what a legitimate development of the JSS is and should be, and whose voices become dominant in the discussions and implementations of it. The argument made is that Western legal knowledge, with its focus on security and technocratic solutions, have been dominant at the expense of core political solutions in regard to the Israeli occupation and the workings of the PA, and that it has downplayed the local context, local voices and their understandings of a legitimate JSS.

  4. An analysis of international situation concerning nuclear security. Focused on the revision to INFCIRC/225/Rev.5

    International Nuclear Information System (INIS)

    Inamura, Tomoaki; Tanabe, Tomoyuki

    2011-01-01

    Since the September 11 attacks in 2001, counterterrorism measures have become not just domestic issues but critical issues that need international cooperation. Various nuclear security measures are in place as part of international counterterrorism measures. This report looks at the trend of international nuclear security measures to get implications for Japan, focusing on INFCIRC/225/Rev.5, an international guideline for physical protection of nuclear materials and nuclear facilities drawn up by IAEA. The observations of this report are as follows: 1) While legally binding nuclear security measures such as multilateral treaties and United Nations Security Council Resolutions impose minimum requirements on individual countries, the approaches led by IAEA or individual countries or private associations aim at more detailed consideration or information sharing to further improve nuclear security. 2) INFCIRC/225/Rev.5 comprises new concepts such as risk-based physical protection and nuclear security culture, as well as extended range of threats such as insiders or stand-off attacks and broader scope of measures to response. Japan should consider incorporation of INFCIRC/225/Rev.5 to its national laws and regulations putting in mind that it may have heavy influence and that Japan pledged to role leadership about nuclear security to international society. (author)

  5. 'Climate change and armed conflict: Challenges and opportunities for maintaining international peace and security through climate justice'

    OpenAIRE

    Das, O.

    2016-01-01

    According to UN Secretary General Ban Ki Moon, “[c]limate change not only exacerbates threats to international peace and security, it is a threat to international peace and security.” Scientific forecasts have determined that climate change causes direct changes and damages to the environment that may then indirectly affect human beings in the long-term. This chapter argues that climate change in certain circumstances, particularly where human adaptation to the changing climate is ineffective...

  6. Time in internationally comparative studies

    NARCIS (Netherlands)

    Scheerens, Jaap; Luyten, Johannes W.; Glas, Cornelis A.W.; Scheerens, J

    2014-01-01

    In this chapter, illustrative internationally comparative data about time at school, time spent in out-of-school programs, and homework/ individual study time are presented. In the first section this is done in a more descriptive way, while in the second and third sections, the association between

  7. Long-term forecasting of international relations as strategic planning of national security policy

    Directory of Open Access Journals (Sweden)

    A. I. Podberezkin

    2017-01-01

    Full Text Available The contemporary transformation and chaos in international relations reduce its predictability, which must be compensated by strengthening the normative content of its analysis that is in fact strategic planning. The deepening of international relations in recent years allows one to make a pessimistic conclusion about the most likely and dangerous scenario for the development of international relations - «the strengthening of military power struggles among the major local human civilizations» and they represent a militarypolitical coalitions and power centers. It should be noted that an effective tool for the implementation of this confrontation is the system of military and civilian instruments used to provide comprehensive multi-factor and multi-dimensional effect on an object. Today, the most striking example of such an integrated infl uence policy is the new public diplomacy. For implementation of such an integrated approach Russia needs to reform the system of national security to include in it not only the traditional enforcement agencies, but also the organizations of business and civil society, as well as to improve coordination between its individual parts. However, the implementation of such a reform is impossible without national ideology that forms the regulatory priorities of national development and national security

  8. It's the talk: a study of involvement initiatives in secure mental health settings.

    Science.gov (United States)

    McKeown, Mick; Jones, Fiona; Wright, Karen; Spandler, Helen; Wright, Joanna; Fletcher, Holly; Duxbury, Joy; McVittie, Jolene; Simon; Turton, Wayne

    2016-06-01

    A study of involvement initiatives within secure mental health services across one UK region, where these have been organized to reflect alliances between staff and service users. There is little previous relevant international research, but constraints upon effective involvement have been noted. To explore and evaluate involvement initiatives in secure mental health settings. A case study design with thematic analysis of qualitative interviews and focus groups. Data collection was carried out between October 2011 and February 2012 with 139 staff and service users drawn from a variety of secure mental health settings. Our analysis offers four broad themes, titled: safety and security first?; bringing it all back home; it picks you up; it's the talk. The quality of dialogue between staff and services users was deemed of prime importance. Features of secure environments could constrain communication, and the best examples of empowerment took place in non-secure settings. Key aspects of communication and setting sustain involvement. These features are discussed with reference to Jurgen Habermas's work on communicative action and deliberative democracy. Involvement initiatives with service users resident in secure hospitals can be organized to good effect and the active role of commissioners is crucial. Positive outcomes are optimized when care is taken over the social space where involvement takes place and the process of involvement is appreciated by participants. Concerns over risk management are influential in staff support. This is germane to innovative thinking about practice and policy in this field. © 2014 The Authors Health Expectations Published by John Wiley & Sons Ltd.

  9. OME APPROAC ES TO T E CURRENT INTERNATIONAL SECURITY AGENDA AND T E T EORETICAL INFLUENCE IN ITS CONTENTS

    Directory of Open Access Journals (Sweden)

    Mariano César Bartolomé

    2017-12-01

    Full Text Available International Security, as an specific field of International relations issues, has a solid existence, although their profiles and boundaries are topics that are always discussed in the academic forums. oth, the orthodox visions, strongly fixed to the XVII century post Westphalia models, as well as more flexible views emerged in the last four decades are faced in these debates. he first, ones tac le the world chessboard only with an State centered approach, with interstate relations on military powerI the second ones, that thin they endorse based mainly a higher empiric support, seeing diverse inds of actors, dynamics and issues. Within this context, the objective of this article are to describe some of the most representative aspects of this counterpoint between the classical approaches and the heterodox readings that are not fixed to the Westphalian models, as well as, to review some points of the contemporary agenda of international security, displaying the heterogeneous insights that have being adding during the last decades. or that, first I will describe how the aspect has muted and the enlargement of the limits of this agenda, then set down some effects of this process, ending with some conclusions and trends. rom a methodological point a view, this article presents a deductive approach to the object of this study, evolving from a general focus to more specific levelsI the analysis, therefore, will alternate between both, descriptive and explicative leves, using secondary sources as well as qualitative data.

  10. Nuclear Cyber Security Case Study and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sunae [ChungNam National Univ., Daejeon (Korea, Republic of); Kim, Kyung doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  11. Nuclear Cyber Security Case Study and Analysis

    International Nuclear Information System (INIS)

    Park, Sunae; Kim, Kyung doo

    2016-01-01

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  12. Oil and international security: old and new issues; Petrole et securite internationale: de nouveaux enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  13. International peace and security. Rome, 5 July 2003. Di Vittorio Foundation Seminar

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    Until the end of the Cold War, a bipolar world maintained international security through a combined system of alliances, spheres of influence, global and regional multilateral institutions - including the United Nations - and ultimately a balance of power through nuclear deterrence. With the disintegration of the Soviet empire, however, a uni-polar world has emerged that has dramatically changed the landscape of international security, with the disappearance of the Cold War rivalries and many of the associated old alliances and spheres of influence. But while in the immediate aftermath of the Cold War many preached the advent of a new world order - and expressed hope of a new paradigm of security that would be rooted in the UN system of collective security - these hopes have not materialized and that new order has not emerged. But with all the changes in the international landscape since the end of the Cold War, nuclear weapons have ironically continued to hold a position of prominence as the currency of ultimate power. With the new threats and new strategic thinking, it is not surprising that the objectives embodied in the Treaty for the Non-Proliferation of Nuclear Weapons (NPT), developed in the early seventies to control the further spread of nuclear weapons and to move towards nuclear disarmament, are under growing stress. Nearly 30 000 nuclear weapons continue to exist in the five nuclear weapon States (China, France, Russia, the United Kingdom, and the United States). And of the three countries that remain outside the NPT, two - India and Pakistan - have in recent years demonstrated their nuclear weapons capability, while the third - Israel - is generally presumed to have them. Most recently North Korea, a party to the NPT, has decided to renounce the Treaty, and is suspected of working to acquire nuclear weapons. And in the aftermath of the events of September 2001, as I have already noted, the proliferation threat gained a new dimension: the prospect of

  14. Global partnering related to nuclear materials safeguards and security - A pragmatic approach to international safeguards work

    International Nuclear Information System (INIS)

    Stanford, Dennis

    2007-01-01

    This paper documents issues Nuclear Fuel Services, Inc. has addressed in the performance of international work to safeguards and security work. It begins with a description of the package we put together for a sample proposal for the Global Threat Reduction Initiative, for which we were ranked number one for technical approach and cost, and concludes with a discussion of approaches that we have taken to performing this work, including issues related to performing the work as part of a team. The primary focus is on communication, workforce, equipment, and coordination issues. Finally, the paper documents the rules that we use to assure the work is performed safely and successfully. (author)

  15. Arms Transfer Policies and International Security: the Case of Brazilian-Swedish Co-operation

    Directory of Open Access Journals (Sweden)

    Carlos Federico Domínguez Avila

    Full Text Available Abstract This article discusses arms trade policies from an international security perspective. Arms transfers are widely treated as political issues even when economic incentives exist. They affect bilateral and multilateral relations among suppliers, countries receiving the arms, non-state actors, taxpayers, and victims. Following the agreement to build Swedish SAAB Gripen NG fighter jets in Brazil, more may be produced for sale to third countries. This, in turn, calls for a review of Brazil’s arms transfer policy. In this instance, Sweden’s principled arms sales model could serve as a basis for a revised Brazilian arms transfer policy as well.

  16. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  17. Normalization of US-Cuban Relations: Obama Doctrine and International Security in the Western Hemisphere

    Directory of Open Access Journals (Sweden)

    Piotr Łaciński

    2015-12-01

    Full Text Available Strained relations between the US and Cuba after the victory of the Cuban revolution were a permanent element of the destabilization of international security in the Western Hemisphere. During the Cold War, this destabilization was a function of the East-West confrontation. Since the end of Cold War the importance of Cuba as a Western Hemisphere entity hostile to the United States has diminished radically. Definite steps to normalize relations with Cuba have been taken only in 2014. The media named the change of policies of the US towards Cuba (and Iran as the Obama Doctrine. This article will try to prove that the continuation of the confron-tational and hostile US-Cuban relations after the collapse of the Eastern bloc was an exceptional and "unnatural" phenomenon from the perspective of realistic school of international relations, both for Washington and Havana.

  18. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  19. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  20. The fog problem in Central Asia - Deficiencies in international community research to support water and food security

    NARCIS (Netherlands)

    Froebrich, J.; Wegerich, K.

    2007-01-01

    Central Asian water planning following international policy recommendations and `blue prints¿ has caused more harm rather than benefiting local communities. International research has not been sufficient to contribute in practical terms to water and food security. This paper reflects potential

  1. Airport Managers' Perspectives on Security and Safety Management Systems in Aviation Operations: A Multiple Case Study

    Science.gov (United States)

    Brown, Willie L., Jr.

    Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.

  2. International Conflict Studies as a Research and Teaching Area

    Directory of Open Access Journals (Sweden)

    Alexandra Viktorovna Khudaykulova

    2015-12-01

    Full Text Available The article analyzes international conflict studies as a science and an educational discipline. The analysis of the subject field and professional terminology adopted in this area both in Russian and in English is provided. Formation of international conflict studies as a distinct field of study in the United States and Western Europe is described. The results of analysis of 10 leading foreign schools on international conflict studies are presented. The main factors that were taken into account in identifying the leading centers were the existence of a separate research (educational analysis units of international conflicts, the world's leading scientific journals on conflict resolution, as well as databases for the analysis of international conflicts. The role of professional associations, education consortia and international organizations (UNESCO in the study of international conflicts is described. An analysis of the leading think tanks on defense and national security (as rated by Philadelphia think tank ranking is also provided. Particular attention is given to interdisciplinary research methodology of international conflicts and the structure of educational programs at leading schools in the world in international relations. The author summarizes the recommendations of the Association of Professional Schools of International Affairs (APSIA to create educational programs of this kind.

  3. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  4. Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source*

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Chen Rui-Ke; Zhou Chun; Jiang Mu-Sheng; Li Hong-Wei

    2017-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie’s mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations . (paper)

  5. Internal dosimetry for epidemiologic studies

    International Nuclear Information System (INIS)

    Groer, P.G.

    1987-01-01

    In traditional epidemiologic analyses, a single valued summary index, the standardized mortality ratio (SMR), is quite popular. The SMR is simply the ratio of the number of deaths observed in the study population to the number of deaths expected if the study population were subject to the age-specific rates of a standard population. SMRs for all causes or specific causes can be calculated. For such a simple analysis an exposed cohort is often characterized by an average organ or whole body dose or dose interval, and the necessary dose estimation effort is relatively minor. Modern statistical methods focus on the estimation of the cause-specific mortality rate λ for study populations exposed to ionizing radiations or toxic chemicals. The dependence of λ on factors other than demographic characteristics, such as race and sex, is usually described through a parametric model. Such factors, often called covariates or covariables, are incorporated in the mathematical expression for the hazard rate. The external gamma dose or the internal lung dose from inhaled uranium are good examples for covariates. This type of analysis permits the use of individual doses and gives a detailed and quantitative description of the mortality rate as a function of the covariables, but at the cost of a major dosimetric effort. The generation of the necessary dose information and also the calculational efforts become especially taxing for time-dependent covariates such as an internal, cumulative organ dose. 4 refs

  6. A study of cyber security in hospitality industry- threats and countermeasures: case study in Reno, Nevada

    OpenAIRE

    Shabani, Neda

    2017-01-01

    The purpose of this study is to analyze cyber security and security practices of electronic information and network system, network threats, and techniques to prevent the cyber attacks in hotels. Helping the information technology directors and chief information officers (CIO) is the aim of this study to advance policy for security of electronic information in hotels and suggesting some techniques and tools to secure the computer networks. This research is completely qualitative while the cas...

  7. International Education and Training Centre (Nuclear security and Nonproliferation) and Ideas for Educational Test Facilities in the centre

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Hyung Min [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2010-10-15

    With respect to the nuclear security-related multilateral agreements, many states and international societies recognize the importance of evaluating and improving their physical protection systems to ensure that they are capable of achieving the objectives set out in relevant IAEA Nuclear Security Series documents. Under this circumstance, finally, on April 12-13, 2010, US President Obama hosted a Nuclear Security Summit in Washington, DC, to enhance international cooperation to prevent nuclear terrorism, an issue which he has identified as the most immediate and extreme threat to global security. The goals of the Nuclear Security Summit were to come to a common understanding of the threat posed by nuclear terrorism, to agree to effective measures to secure nuclear material, and to prevent nuclear smuggling and terrorism. The Summit focused on the security of nuclear materials, nonproliferation, disarmament, and peaceful nuclear energy. At the summit, the Republic of Korea was chosen as the host of the next Summit in 2012. After President Barack Obama declared the opening of the Summit and explained the purpose of the meeting, he designated Korea as the host of the Second Nuclear Security Summit, which was unanimously approved by the participating leaders. During the Summit, President Lee introduced Korea's measures for the physical protection of nuclear materials and laid out what contributions Korea would make to the international community. He also stated that the North Korean leader would be welcomed at the next summit only if his country made substantial pledges toward nuclear disarmament during the Six-Party Talks and announced that Seoul would host the general assembly of the Global Initiative to Combat Nuclear Terrorism in 2011 and would share its expertise and support the Summit's mission by setting up an education and training center on nuclear security in 2014

  8. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  9. Regional, national and international security requirements for the transport of nuclear cargo by sea

    International Nuclear Information System (INIS)

    Booker, P.A.; Barnwell, I.

    2004-01-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea

  10. Social Studies Education as Panacea for Security Challenges in ...

    African Journals Online (AJOL)

    Social studies education has been embraced by almost all the developed and developing countries to support economic growth and development. Here, we review the current security situation, especially existing social studies policies and highlight the need for social studies as a tool for addressing insecurity.

  11. Nuclear terrorism: Identifying and combating the risks. International conference on nuclear security, 16 March 2005, London, UK

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    Security strategies, for many centuries, have been based on boundaries: the strategic placement of cities and borders to take advantage of natural barriers; defences that relied on walls, trenches and armadas; and the use of ethnic, religious or other groupings to distinguish friend from foe. In the 20th Century, the advent of airplanes, submarines and ballistic missiles began to undermine this approach to security by enabling the remote delivery of destruction on a scale previously not envisioned. But the change that has altered the international security landscape the most drastically is, in fact, globalization. The global community has become interdependent, with the constant movement of people, ideas and goods. Many aspects of modern life, communication, the global marketplace and, most recently, the rise in international terrorism - clearly indicate that our understanding of and approaches to national and international security must be adjusted, in keeping with new realities. This statement discusses: Nuclear Security and the Protection Against Nuclear Terrorism, IAEA Nuclear Security Plan of Activities founded on measures to guard against thefts of nuclear and other radioactive material and to protect related facilities against malicious acts; cooperation with other organizations and efforts

  12. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  13. Internal Security Institutions Meeting Internet Governance. A comparative view on the UK and Germany

    Directory of Open Access Journals (Sweden)

    Jasmin Röllgen

    2012-01-01

    Full Text Available The internet stays a high potential infrastructure of open interaction, hence, governmental desires in monitoring the internet are growing. A demonstrative example might be the attempts to make any technology based communication ‘traceable’ with the help of a European scheme of data retention (EU direction 2006/24/EC and its national ratifications. Regarding this, two theses come up: First, governments try to achieve their logic of ‘real life’ internal security also within the internet regime. Second, the internet changed the society in so far as it opened space for new relevant communities and actors – lobbying more and more on institutionalised paths. This will be shown by analysing the processes in the UK and Germany. A focus will lie on each national implementation of the EU’s data retention directive. Societal and especially political differences will find some notion as well, as they build the framework of any political decision making process.

  14. Cogeneration of Electricity and Potable Water Using The International Reactor Innovative And Secure (IRIS) Design

    International Nuclear Information System (INIS)

    Ingersoll, D.T.; Binder, J.L.; Kostin, V.I.; Panov, Y.K.; Polunichev, V.; Ricotti, M.E.; Conti, D.; Alonso, G.

    2004-01-01

    The worldwide demand for potable water has been steadily growing and is projected to accelerate, driven by a continued population growth and industrialization of emerging countries. This growth is reflected in a recent market survey by the World Resources Institute, which shows a doubling in the installed capacity of seawater desalination plants every ten years. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh/m3 of produced desalted water. At current U.S. water use rates, a dedicated 1000 MW power plant for every one million people would be required to meet our water needs with desalted water. Nuclear energy plants are attractive for large scale desalination application. The thermal energy produced in a nuclear plant can provide both electricity and desalted water without the production of greenhouse gases. A particularly attractive option for nuclear desalination is to couple a desalination plant with an advanced, modular, passively safe reactor design. The use of small-to-medium sized nuclear power plants allows for countries with smaller electrical grid needs and infrastructure to add new electrical and water capacity in more appropriate increments and allows countries to consider siting plants at a broader number of distributed locations. To meet these needs, a modified version of the International Reactor Innovative and Secure (IRIS) nuclear power plant design has been developed for the cogeneration of electricity and desalted water. The modular, passively safe features of IRIS make it especially well adapted for this application. Furthermore, several design features of the IRIS reactor will ensure a safe and reliable source of energy and water even for countries with limited nuclear power experience and infrastructure. The IRIS-D design utilizes low-quality steam extracted from the low-pressure turbine to boil seawater in a multi-effect distillation desalination plant. The desalination plant is based on the horizontal

  15. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  16. International cooperation for food and nutrition security: Systematization of the participatory, contextualized, and intersectoral educational practices

    Directory of Open Access Journals (Sweden)

    Luciene BURLANDY

    Full Text Available ABSTRACT The present study systematized the experience gained with the project Construindo capacidades em segurança alimentar e nutricional no Brasil, Canadá e Angola (2004-2010, Building food and nutrition security skills in Brazil, Canada, and Angola, whose objective was to qualify actions that promote food and nutrition security in the three countries using different educational practices. The activities were organized in the following subprojects: (a online distance learning courses; (b workshops to train managers, government technicians, representatives of civil society organizations, and social subjects who offered to act as a link between communities; and (c local pilot projects. The present study reports this experience. The educational practices implemented in the municipalities of Araçuaí (MG, Juazeiro (BA, and Fortaleza (CE were analyzed based on systematized information in the project reports and activity records (texts and photographs. The analytical reference was based on the concept of food and nutrition education, guided by the fundamentals of Popular Education and Paulo Freire; on the concept of food and nutrition security; and on the following analytical dimensions: participation, contextualization of educational practices, and intersectoriality. The results evidenced how educational practices contributed to the construction of shared concepts of food and nutrition security from an intersectoral and participatory perspective that values the peculiarities of diet in different socioeconomic and cultural contexts, and highlights daily situations and local traditions. They also expose the limits and potentialities of an experience of this magnitude, conducted from an interdisciplinarity perspective and using participatory methods.

  17. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  18. Social Status, Traditional Food Taboos and Food Security: A Study ...

    African Journals Online (AJOL)

    A study was conducted to examine adherence to traditional food taboos by women in Imo State, and relate that to social status and food security. Data was collected from 72 women across the three agricultural zones of the State. It was found that age, income and education are some factors affecting adherence to these ...

  19. International Journal of Humanistic Studies: Site Map

    African Journals Online (AJOL)

    International Journal of Humanistic Studies: Site Map. Journal Home > About the Journal > International Journal of Humanistic Studies: Site Map. Log in or Register to get access to full text downloads.

  20. International Journal of Humanistic Studies: Journal Sponsorship

    African Journals Online (AJOL)

    International Journal of Humanistic Studies: Journal Sponsorship. Journal Home > About the Journal > International Journal of Humanistic Studies: Journal Sponsorship. Log in or Register to get access to full text downloads.

  1. Future consumer mobile phone security : a case study using the data centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    2008-01-01

    In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested,

  2. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  3. Current fundamental science challenges in low temperature plasma science that impact energy security and international competitiveness

    Science.gov (United States)

    Hebner, Greg

    2010-11-01

    Products and consumer goods that utilize low temperature plasmas at some point in their creation touch and enrich our lives on almost a continuous basis. Examples are many but include the tremendous advances in microelectronics and the pervasive nature of the internet, advanced material coatings that increase the strength and reliability of products from turbine engines to potato chip bags, and the recent national emphasis on energy efficient lighting and compact fluorescent bulbs. Each of these products owes their contributions to energy security and international competiveness to fundamental research investments. However, it would be a mistake to believe that the great commercial success of these products implies a robust understanding of the complicated interactions inherent in plasma systems. Rather, current development of the next generation of low temperature plasma enabled products and processes is clearly exposing a new set of exciting scientific challenges that require leaps in fundamental understanding and interdisciplinary research teams. Emerging applications such as liquid-plasma systems to improve water quality and remediate hazardous chemicals, plasma-assisted combustion to increase energy efficiency and reduce emissions, and medical applications promise to improve our lives and the environment only if difficult science questions are solved. This talk will take a brief look back at the role of low temperature plasma science in enabling entirely new markets and then survey the next generation of emerging plasma applications. The emphasis will be on describing the key science questions and the opportunities for scientific cross cutting collaborations that underscore the need for increased outreach on the part of the plasma science community to improve visibility at the federal program level. This work is supported by the DOE, Office of Science for Fusion Energy Sciences, and Sandia National Laboratories, a multi-program laboratory managed and operated

  4. Fissile materials and international security in the post-Cold War world

    International Nuclear Information System (INIS)

    Anon.

    1996-01-01

    It is essential that members of industry, government and international organizations be able to come together to discuss the latest developments in this vital field at events such as this. Given the number of years this organization has devoted to the issue, the INMM must find it interesting that the control of fissile materials has become such a high-profile issue in the policy and political communities. But, this evolution in policy is a natural outgrowth of the changing world situation. While just 10 years ago the US and Soviet Union were churning out the fissile materials needed for weapons, today these former rivals are working together, hand in hand, to corral the danger posed by these materials. And, while it is clear that the world no longer lives on the edge of nuclear war, the nuclear danger still exists, though in a less obvious and perhaps more insidious form. It is a great challenge in this post-Cold War world to contain this nuclear threat. It is prudent and necessary for the US to be in the forefront of efforts to address and tame this problem. The fundamental threat posed by the proliferation of nuclear weapons and materials is a direct challenge to US and world security. President Clinton has clearly recognized the changed nature of the nuclear danger. To meet this challenge, he has labored to put in place a comprehensive and integrated plan for addressing this threat. The US Department of Energy has a unique role in this effort because, as an institution with many decades of experience in fissile material matters, it is able to provide expertise and technical analyses that are essential in defining and implementing policy prescriptions. The president's comprehensive plan to prevent nuclear proliferation and reduce the danger posed by weapons-usable nuclear materials has four essential elements: secure existing nuclear material stockpiles; limit fissile material production and use, eliminate warheads, and strengthen the nonproliferation regime

  5. 76 FR 37403 - Treasury International Capital Form SLT: Report of Aggregate Holdings of Long-Term Securities by...

    Science.gov (United States)

    2011-06-27

    ... DEPARTMENT OF THE TREASURY Treasury International Capital Form SLT: Report of Aggregate Holdings... is informing the public that it is conducting a mandatory monthly collection of information on cross....- resident end-investor. Securities held as part of a direct investment relationship should not be reported...

  6. International pooling of operators' funds: an option to increase the amount of financial security to cover nuclear liability?

    International Nuclear Information System (INIS)

    Pelzer, N.

    2007-01-01

    This paper aims at answering the question whether international pooling of operators funds could open a viable avenue to complement financial security provided by insurance and thus to either fill gaps in insurance coverage or increase amount of compensation for nuclear damage. (author)

  7. Secured web-based video repository for multicenter studies.

    Science.gov (United States)

    Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S

    2015-04-01

    We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. We believe our system can be a model for similar projects that require access to common video resources. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. International Research Study of Public Procurement

    NARCIS (Netherlands)

    Telgen, Jan; Harland, C.; Callender, G.; Harland, C.; Nassimbeni, G.; Schneller, E.

    2012-01-01

    In this chapter we examine the specific issue of public procurement, its importance to local, regional, national, and international economies as evidenced in a unique international comparative research study – the International Research Study of Public Procurement (IRSPP). First the public

  9. Information Security Management: The Study of Lithuanian State Institutions

    OpenAIRE

    Jastiuginas, Saulius

    2012-01-01

    Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information s...

  10. Asthma severity, child security, and child internalizing: using story stem techniques to assess the meaning children give to family and disease-specific events.

    Science.gov (United States)

    Winter, Marcia A; Fiese, Barbara H; Spagnola, Mary; Anbar, Ran D

    2011-12-01

    Children with persistent asthma are at increased risk for mental health problems. Although mechanisms of effect are not yet known, it may be that children are less trusting of the family as a source of support and security when they have more severe asthma. This study tested whether asthma severity is related to children's perceptions of insecurity in the family, and whether insecurity is in turn associated with child adjustment. Children (N = 168; mean age = 8 years) completed story stems pertaining to routine family events (e.g., mealtimes) and ambiguous but potentially threatening asthma events such as tightness in the chest. Responses were evaluated for the extent to which appraisals portrayed the family as responding in cohesive, security-provoking ways. Asthma severity was assessed by both objective lung function testing and primary caregiver report. Caregivers reported child symptomatology. Beyond medication adherence, caregiver education, and child age and gender, greater asthma severity predicted more internalizing and externalizing symptoms. Greater asthma severity, assessed using spirometry (but not parent report), was related to less secure child narratives of the family, which in turn related to more child internalizing symptoms. Results suggest that asthma can take a considerable toll on children's feelings of security and mental health. Furthermore, given the difficulty in assessing young children's perceptions, this study helps demonstrate the potential of story stem techniques in assessing children's appraisals of illness threat and management in the family.

  11. Beneficial impacts of an international grain reserve on global food security

    Science.gov (United States)

    Otto, C.; Schewe, J.; Puma, M. J.; Frieler, K.

    2017-12-01

    Highly volatile food prices on global markets challenge food security. Only in the last decade, two pronounced food price spikes severely affected vulnerable populations worldwide by increasing malnutrition and hunger. This has stirred up the debate upon the usefulness of an international grain reserve. Whereas advocates argue that it could damp damaging price extremes, opponents question its effectiveness and are concerned about associated market distortions and costs. However, to our knowledge, a comprehensive quantitative assessment is still missing. For this purpose, we introduce an agent-based dynamic multi-regional model that consistently accounts for intra-annual strategic as well as commercial storage holding. For the case of wheat, we first show that the model is able to reproduce historical world market prices (see Fig. 1(a)) and regional ending stocks (stocks see Fig.1(b) for global ending stocks) from 1980 to the present. Having a bi-annual timestep, the model enables us to single out the main drivers of past short-term price volatility: regional, mainly weather induced, production variations followed by trade policies as the second most important driver. The latter include, both, long-term stockholding management decisions as well as short-term regional political responses to scarcity situations such as export restrictions and restocking attempts. We then quantitatively model a strategic wheat reserve managed by an international body such as the UN. We discuss a management scheme for the reserve that aims at stabilizing prices within a price band by buying at low and selling at high prices (cf. Fig. 1). Importantly, in order to minimize market distortions, this scheme is not designed to damp out price volatility completely, but to merely avoid damaging price extremes. Thus, it preserves the incentive for producers to invest in agricultural development and it can only complement and not replace local efforts to increase the food system's resilience

  12. Securing life through technology acceptance: the first six months after transvenous internal cardioverter defibrillator implantation.

    Science.gov (United States)

    Burke, L J

    1996-01-01

    To understand the experience of living with a transvenous internal cardioverter defibrillator (ICD) during the first 6 months after implantation. A grounded theory approach was used to gain an understanding of the antecedents, conditions, and consequences of the core process. Two midwestern community medical centers and patients' homes within a 250-mile radius from the medical centers. Ten women and 14 men between 22 and 78 years of age, who had undergone a new transvenous ICD implantation within the last week. The core process that described the experience of living with a transvenous ICD during the first 6 months after implantation was the process of "securing life through technology acceptance." This core process was characterized by three major categories: choosing life with technology, integrating technology into life, and living life through technology. Nursing interventions related to individualized assessment, education, and counseling are warranted to facilitate patient and family understanding and to plan for the cyclic process involved in integrating a transvenous ICD into their lives. Directions for further research are provided.

  13. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  14. Nuclear non-proliferation: Global security in a rapidly changing world. Carnegie International Non-Proliferation Conference, 21 June 2004, Washington, DC, USA

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    This statement outlines what the IAEA and the international community has learned, what are the problems faced and the nature of the required reforms in the field of non-proliferation, security, safeguards inspection. The proposals are mostly fucued on international/collective cooperation in arms control, improvements of security and effectiveness of safeguards

  15. Energy and water tradeoffs in enhancing food security: A selective international assessment

    International Nuclear Information System (INIS)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  16. An Empirical Study of Security Issues Posted in Open Source Projects

    DEFF Research Database (Denmark)

    Zahedi, Mansooreh; Ali Babar, Muhammad; Treude, Christoph

    2018-01-01

    When developers gain thorough understanding and knowledge of software security, they can produce more secure software. This study aims at empirically identifying and understanding the security issues posted on a random sample of GitHub repositories. We tried to understand the presence of security...

  17. Legal Elements For Nuclear Security: Egyptian Nuclear Law As A Case Study

    International Nuclear Information System (INIS)

    Ali, A.M.

    2013-01-01

    This paper deals with the legal bases for nuclear security. First, It analysis the international legal framework for nuclear security. Second, it analysis the legal bases for the import-export control. The legal aspects related with illicit trafficking (IT) were also reviewed. Third, It deals with the Egyptian nuclear law no. 7 and its executive regulation. The Egyptian legal regime for nuclear security and the role of State System for Accounting and Control of Nuclear Materials (SSAC) in realizing the nuclear security were also discussed. The purpose of the paper is to evaluate the Egyptian legal framework for nuclear security.

  18. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  19. CASP CompTIA Advanced Security Practitioner Study Guide Exam CAS-001

    CERN Document Server

    Gregg, Michael

    2012-01-01

    Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that as

  20. Developing International Business Managers through International Study Visits to China

    Science.gov (United States)

    Tang, Yiming; Rose, Susan

    2014-01-01

    Globalization is a key factor in the success of business organizations today, impacting many aspects of management performance. Understanding the global business environment has therefore become a key objective in the teaching of international business on Executive MBA programs. Drawing on the theory of experiential learning, this study examines…

  1. Value Relevance Change Under International Accounting Standards: An Empirical Study of Peru

    OpenAIRE

    Chunhui Liu; Lee J. Yao; Michelle Y. M. Yao

    2012-01-01

    In face of broad adoption of International Financial Reporting Standards (IFRS), the Securities and Exchange Commission (SEC) is considering its quality and acceptability. This paper reports a study that examines changes in value relevance with a sample of Peru firms mandated to use international accounting standards between 1999 and 2007. The period under study is broken into a period of International Accounting Standards (IAS) between 1999 and 2001, a period of early IFRS between 2002 and 2...

  2. The First International Conference on Global Food Security – A Synthesis

    NARCIS (Netherlands)

    Ittersum, van M.K.; Giller, K.E.

    2014-01-01

    Improving food security is difficult. There are many reasons why hunger and malnutrition persist, not least because deep social inequities and conflicts often dominate. Equally many approaches are needed to deal with this global problem. In the case of global food security, improvements can depend

  3. 78 FR 62901 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-10-22

    ... per contract from its prior rate of $0.05 per contract. See Securities Exchange Act Release No. 69768... similar products.\\13\\ \\13\\ At least one other exchange currently trades foreign currency options. While... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70647; File No. SR-ISE-2013-50] Self-Regulatory...

  4. Nuclear desalination option for the international reactor innovative and secure (IRIS) design

    International Nuclear Information System (INIS)

    Ingersoll, D. T.; Binder, J. L.; Conti, D.; Ricotti, M. E.

    2004-01-01

    The worldwide demand for potable water is on the rise. A recent market survey by the World Resources Institute shows a doubling in desalinated water production every ten years from both seawater and brackish water sources. The production of desalinated water is energy intensive, requiring approximately 3-6 kWh per cubic meter of produced desalted water. At current U.S. water use rates, 1 kW of energy capacity per capita (or 1000 MW for every one million people) would be required to meet water needs with desalted water. The choice of the desalination technology determines the form of energy required: electrical energy for reverse osmosis systems, relatively low quality thermal energy for distillation systems, and both electrical and thermal energy for hybrid systems such as pre-heat RO systems. Nuclear energy plants are attractive for large scale desalination application. Nuclear plants can provide both electrical and thermal energy in an integrated, co-generated fashion to produce a spectrum of energy products including electricity, desalted water, process heat, district heating, and potentially hydrogen generation. A particularly attractive option for nuclear desalination is to couple it with an advanced, modular, passively safe reactor design such as the International Reactor Innovative and Secure (IRIS) plant. This allows for countries with smaller electrical grid needs and infrastructure to add new electrical and desalination capacity in smaller increments and at distributed sites. The safety by design nature of the IRIS reactor will ensure a safe and reliable source of energy even for countries with limited nuclear power experience and infrastructure. Two options for the application of the IRIS nuclear power plant to the cogeneration of electricity and desalted water are presented, including a coupling to a reverse osmosis plant and a multistage flash distillation plant. The results from an economic assessment of the two options are also presented.(author)

  5. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  6. The Houston Ship Channel security: a case study

    Science.gov (United States)

    Le, Han Q.; Bellamy, P. A.; Pei, S. S. S.

    2007-04-01

    The Houston Ship Channel (HSC) is a 50-mile long shipping channel that contains many private ports including the Port of Houston Authority. It has a uniquely critical role with respect to the US petroleum energy supply. The HSC security is currently planned for significant enhancement under the auspices of the Harris County and the Houston-based Port Strategic Security Council. The ultimate objective is to comprehensively address the HSC threat matrix. This paper describes the technical effort in support of this program. The HSC security is a complex system of systems that includes the physical control access system, the command, control, communication, and information (C4I) system, and the telecom infrastructure. The strategy is to coordinate the improvements of different components to achieve a high-impact net effectiveness. A key element is a planned high-capacity backbone optical network for integrating the C4I of many different HSC administrative-jurisdictional authorities, which will allow unified situational awareness for a more effective cooperation and coordination. Enhancement of surveillance and intrusion protection is crucial. A feasibility study was conducted for the HSC assuming common surveillance technologies including visible/IR camera, radar, and sonar. The method includes survey and theoretical modeling to detect threats of concern in the HSC natural environment. The result indicates that the HSC unique river-like geography offers both advantages and challenges. The narrow channel allows ease of waterside surveillance, but likely incurs high cost for its great length. In addition, landside security is also important owing to its location amidst urban-industrial zone. Lastly, limitation of the various technologies is discussed by considering the broader challenges of the intrusion problem.

  7. Battle for Ulster. A Study of Internal Security

    Science.gov (United States)

    1987-06-01

    evidence . . does not support the view that they are merely mindless hooligans drawn from-the unemployed and unemployable. The ProvisionaL IRA now...marriages are nearly taboo. Even in sports, Protestants tend toward soccer and rugby, Catholics play hurling and Gaelic football , Pauline, an executive...SECTARIANISM ii ,4’ I Sectarian differences appear even in sports. Hurling, shown here, and Gaelic football are traditionally Catholic sports

  8. IRIS (International Reactor Innovative and Secure) - design overview and deployment prospects

    International Nuclear Information System (INIS)

    Carelli, M.D.; Petrovic, B.; Cavlina, N.; Grgic, D.

    2005-01-01

    The International Reactor Innovative and Secure (IRIS) is an advanced, integral, lightwater cooled, pressurized reactor of medium generating capacity (1000 MWt, or about 335 MWe). It has been under development since the turn of the century by an international team - led by Westinghouse - that includes 19 organizations from 10 countries. In year 2002 it has initiated the pre-application review with the U.S. Nuclear Regulatory Commission (NRC), aiming at final design approval around 2010, and deployment in next decade (about 2015), consistent with the prediction of the growing energy supply gap in both developing and developed countries. This paper describes the reactor layout (i.e., its integral design, with the steam generators, pumps, pressurizer and control rod drive mechanisms all included inside the reactor vessel, together with the core, control rods, and neutron reflector/shield) and discusses the unique s afety-by-design T M IRIS philosophy. This approach, by eliminating accidents at the design stage, or decreasing their consequences and probabilities when outright elimination is not possible, provides a very powerful first level of defense in depth. The ''safety-bydesign'' TM allows a significant reduction and simplification of the passive safety systems, which not only improves its safety but simultaneously reduces the overall cost. Moreover, it supports licensing the power plant with reduced off-site emergency response requirements. The modular IRIS - with each module rated at ∼335 MWe - is an ideal size for smaller energy grids as it allows introducing sequentially single modules in regions only requiring a few hundred MWs at a time. IRIS naturally can be also deployed in multiple modules in areas requiring a larger amount of power increasing with time, thus fulfilling the needs of larger, developed countries as well. The performed top-down economic analysis indicates that the cost of generated electricity is competitive with other nuclear and non

  9. The DISAM Journal of International Security Assistance Management. Volume 23, Number 2, Winter 2001

    Science.gov (United States)

    2001-01-01

    ALBERT DAVID (FF-1050) to the Government of Brazil on a grant basis in accordance with Section 516, FAA. • Ex-USS VREELAND (FF-1068) and ex-USS...The DISAM Journal, Winter 2001 90 Protection Project to continue its study of international trafficking, prostitution, slavery, debt bondage and other...amounting to debt bondage , involuntary servitude, or slavery. This includes about 50,000 women and children trafficked annually into the U.S. [Section 102

  10. Is international election observation credible? Evidence from Organization for Security and Co-operation in Europe missions

    OpenAIRE

    Max Bader; Hans Schmeets

    2014-01-01

    While international election observations missions often aim to present generalizable claims about the quality and integrity of an election, their findings are rarely based on a representative sample of observations, undermining the credibility of the missions. Bias in the selection of polling stations, among other things, can inflate or deflate the percentage of polling stations where observers find significant flaws. This article uses original data from Organization for Security and Co-oper...

  11. Right to Food, Food Security and Food Aid Under International Law, or the Limits of a right-based approach

    OpenAIRE

    Gualtieri, Donato

    2013-01-01

    The right to food has become a pillar of international humanitarian and human rights law. The increasing number of food-related emergencies and the evolution of the international order brought the more precise notion of food security and made a potential right to receive food aid emerge. Despite this apparent centrality, recent statistics show that a life free from hunger is for many people all over the world still a utopian idea. The paper will explore nature and content of the right to food...

  12. Sourcing of internal auditing : An empirical study

    NARCIS (Netherlands)

    Speklé, R.F.; Elten, van H.J.; Kruis, A.

    2007-01-01

    This paper studies the factors associated with organizations’ internal audit sourcing decisions, building from a previous study by Widener and Selto (henceforth W&S) [Widener, S.K., Selto, F.H., 1999. Management control systems and boundaries of the firm: why do firms outsource internal audit

  13. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  14. Cognitive Behaviour Therapy for Psychosis in High Secure Services: An Exploratory Hermeneutic Review of the International Literature.

    Science.gov (United States)

    Slater, Jonathon; Townend, Michael

    2016-11-01

    Mainstream psychological interventions may need adaptation in High Secure (HS) healthcare contexts to enable better recovery, safeguard the public and offer economic value. One specific psychological intervention, cognitive behavioural therapy for psychosis (CBTp), has an already proven efficacy in aiding recovery in non-forensic populations, yet its impact in HS settings has received considerably less research attention. This exploratory review catalogues CBTp approaches used in HS hospitals and appraises impact through the inclusion of both fugitive literature and peer reviewed research. A pragmatic approach was utilized through an iterative literature search strategy and hermeneutic source analysis of the identified studies. Fourteen studies were identified from HS contexts from within the UK and internationally. These included group, individual therapy and CBTp linked milieus. CBTp is an active component of treatment in HS contexts. Some modes of delivery seem to have greater levels of efficacy with more typical HS patients. The literature indicates key differences between HS and non-HS applied CBTp. Continued application and evaluation of CBTp in HS conditions is warranted.

  15. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  16. Human Rights, Human Needs, Human Development, Human Security - Relationships between four international human discourses.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    markdownabstractAbstract: Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and

  17. Disaster at a University: A Case Study in Information Security

    Science.gov (United States)

    Ayyagari, Ramakrishna; Tyks, Jonathan

    2012-01-01

    Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…

  18. Development Aid and International Politics: Does Membership on the UN Security Council Influence World Bank Decisions?

    OpenAIRE

    Dreher, Axel; Sturm, Jan-Egbert; Vreeland, James R.

    2007-01-01

    We investigate whether temporary members of the UN Security Council receive favorable treatment from the World Bank, using panel data for 157 countries over the period 1970-2004. Our results indicate a robust positive relationship between temporary UN Security Council membership and the number of World Bank projects a country receives, even after accounting for economic and political factors, as well as regional and country effects. The size of World Bank loans, however, is not affected by UN...

  19. International Scientific Migration: Progress or a Threat to Russia’s Scientific and Technological Security

    Directory of Open Access Journals (Sweden)

    Viktor Anatolyevich Koksharov

    2018-03-01

    Full Text Available The authors focus on the issues of scientific migration. This trend is relevant from both an academic perspective — studying the individual’s economic behaviour, as well as practical one, because competition for talent has a significant impact on innovation policy initiatives around the world. Most Russian and foreign researchers are unanimous about the main complication for these studies: the lack of reliable information about scientific researchers’ migration. To search for these data, we have developed a methodology implemented in software based on the big data technology. This software allows to analyse data sets from leading scientific citation bases. The information on scientific migration resulted from the analysis of changes in affiliation. We have collected the data on the scientific migration of researchers employed by the Ural Federal University from the Scopus database. The verification of the obtained data showed their high reliability. Most researchers move to Western European countries and the United States (up to 72 %. The main areas of emigrating researchers’ scientific interests are natural and technical sciences. The optimal approach to minimizing the negative impact of scientific migration on Russia’s scientific and technological security is the practical application of the theory of brain sharing. According to this theory, a large scientific diaspora abroad is an essential resource for the development of science and innovation.

  20. Perceptions of international education: A preliminary study

    Science.gov (United States)

    Hayden, M. C.; Thompson, J. J.

    1995-09-01

    The field of international education, in the sense of education experienced by growing numbers of children of parents who are internationally mobile and who wish their children to accompany them as they travel the world, has expanded rapidly since the 1940s. Increasing numbers of "international schools" offer "international education", which includes in some cases offering "international curricula", but little research has been undertaken to date into the precise nature of such education or the shared characteristics of such schools. This paper describes a small-scale study undertaken with undergraduate students at the University of Bath who had experienced such an education before registering at the University, and investigates the perceptions of these students with respect to a number of key issues identified as relevant to the field of international education.

  1. A study on the promotion of nuclear security culture

    International Nuclear Information System (INIS)

    Tamai, Hiroshi; Tazaki, Makiko; Kokaji, Lisa; Shimizu, Ryo; Suda, Kazunori

    2015-01-01

    In recent years the promotion of nuclear security culture aiming at strengthening nuclear security is extensively mentioned, however, awareness of nuclear security culture seems to be not much high compared to the permeation of nuclear safety culture. As a world's leading country of peaceful nuclear use, permeation of nuclear security culture into various social classes must be one of important issues in Japan. Learning from the TEPCO Fukushima Daiichi nuclear power plant accident, complementarity between nuclear safety and nuclear security in the aspect of both protection measures has been profoundly recognised. Therefore, it will be natural to promote nuclear security culture modelled on the preceding nuclear safety culture. On this standpoint, the paper examines an approach for the promotion of nuclear security culture which, for example, consists of awareness cultivation, attitude progress, permeation assessment, and resulting in the establishment of PDCA Cycle. (author)

  2. CompTIA Security+ Study Guide Exam SY0-301

    CERN Document Server

    Dulaney, Emmett

    2011-01-01

    The preparation you need for the new CompTIA Security+ exam SY0-301 This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam topics such as general security concepts, infrastructure security, the basics of cryptography, and much more. Provides 100% coverage of all exam objectives for the new CompTIA Security+ exam

  3. Evaluation of Participant Needs in a Regional Center for Security Studies

    Science.gov (United States)

    Schmoker, Oliver E., III.

    2009-01-01

    This research study was implemented within the subject headquarters of a regional center, an organization responsible for security cooperation in Europe and Eurasia. The focus of the study was the center's program of security education. This program was designed to support evolving security objectives of foreign countries in order to increase the…

  4. International study on energy policies

    International Nuclear Information System (INIS)

    Anon.

    2004-01-01

    A study, presented in September 2004 at the world energy council congress of Sydney (Australia) by the French agency of environment and energy mastery (Ademe) evaluates the energy efficiency policies and their impact in 63 countries, and in particular in the developing countries. It has permitted to identify the five most efficient measures about which case studies have been given to subject specialists for thorough analysis. Completed in July 2004, this triennial report has been carried out by the Ademe and the World energy council with the joint collaboration of the Latin American energy organization (Olade) and the Asia Pacific energy research centre (Aperc) under the coordination of Enerdata agency. This short article makes a brief summary of this presentation: energy efficiency at the global scale, transport sector, world power consumption and CO 2 emissions, evaluation of energy efficiency policies and measures (institutions and programmes, efficiency labels and standards for household appliances, innovative financing means, local information centers). (J.S.)

  5. 75 FR 33885 - Office of International Affairs; Survey of Foreign Ownership of U.S. Securities as of June 30, 2010

    Science.gov (United States)

    2010-06-15

    ... DEPARTMENT OF THE TREASURY Office of International Affairs; Survey of Foreign Ownership of U.S... it is conducting a mandatory survey of foreign ownership of U.S. securities as of June 30, 2010. This... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  6. International Study Group Progress Report

    Energy Technology Data Exchange (ETDEWEB)

    Raubenheimer, Tor O

    2000-07-18

    The focus of the ISG work was on advancing the accelerator design and supporting technologies. This is a complex process which involves a close interaction between theoretical analysis of the collider design and R and D progress on hardware components. The sequence of efforts took place roughly in the following order: (1) Optimization of the collider parameters and definition of system and subsystem requirements, (2) Identification of design strategies and options, and (3) Development of specific technologies to achieve these requirements. Development and testing of the required components, and R and D on manufacturing techniques have been important activities of the ISG. Experiments at the major test facilities such as the ATF at KEK and ASSET at SLAC have also played a significant role in the ISG studies.

  7. Immune Inspired Security Approach for Manets: a Case Study

    Science.gov (United States)

    Mohamed, Yasir Abdelgadir

    2011-06-01

    This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.

  8. NASA plan for international crustal dynamics studies

    Science.gov (United States)

    1979-01-01

    The international activities being planned as part of the NASA geodynamics program are described. Methods of studying the Earth's crustal movements and deformation characteristics are discussed. The significance of the eventual formalations of earthquake predictions methods is also discussed.

  9. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  10. On Small-Scale IT Users’ System Architectures and Cyber Security: A UK Case Study

    OpenAIRE

    Osborn, E; Simpson, A

    2017-01-01

    Despite long-standing predictions that developments in, for example, personal and cloud computing practices would change the ways in which we approach security, small-scale IT users (SSITUs) remain ill-served by existing cyber security practices. Following an extensive study of the adoption of cyber security in UK-based SSITUs, this paper discusses results pertaining to technologies employed by such organisations, with respect to their ability to apply security measures. We determine: that th...

  11. Towards robust experimental design for user studies in security and privacy

    OpenAIRE

    Krol, K.; Spring, J. M.; Parkin, S.; Sasse, M. A.

    2016-01-01

    Background: Human beings are an integral part of computer security, whether we actively participate or simply build the systems. Despite this importance, understanding users and their interaction with security is a blind spot for most security practitioners and designers. / Aim: Define principles for conducting experiments into usable security and privacy, to improve study robustness and usefulness. / Data: The authors’ experiences conducting several research projects com...

  12. Building public health capacity in Afghanistan to implement the International Health Regulations: a role for security forces.

    Science.gov (United States)

    Chrétien, Jean-Paul; Yingst, Samuel L; Thompson, Donald

    2010-09-01

    The government of Afghanistan, with international partners and donors, has achieved substantial public health improvements during the past 8 years. But a critical gap remains: capacities to detect and respond to disease outbreaks that could constitute a public health emergency of international concern, as required by the International Health Regulations (IHR). The Afghan Ministry of Public Health seeks to build these capacities, but conflict and scarcity of resources hinder public health surveillance and response, diagnostic laboratory and clinical management capacity is limited, and massive international population movements could permit outbreaks to cross international borders. Several diseases covered by the IHR, such as polio, are endemic in Afghanistan, and risk of novel disease emergence may be elevated in some areas. The security forces of the United States and other countries with military presence in Afghanistan are potential partners for the government of Afghanistan in strengthening the public health capacity. They could extend specialized disease surveillance and response capabilities to the Afghan military and civilian sectors and could integrate surveillance and response capacity building into ongoing development programs, especially in insecure areas. The World Health Organization could provide the forum for coordinating military and civilian contributions to public health capacity strengthening in Afghanistan and could help ensure that international health sector development efforts address Afghan public health priorities in addition to IHR requirements.

  13. 78 FR 11921 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-02-20

    ... market participants with meaningful trading opportunities in this product. Further, quoting and trading... currently approved on the following five (5) underlying securities: SPDR S&P 500 ETF (``SPY''), Apple Inc... success of this new product offering and would also lead to investor confusion. The Exchange notes that...

  14. 76 FR 51082 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-17

    ... will be broken by the Exchange if they exceed the applicable percentage from the Reference Price, as noted in the table found under Rule 2128(c)(1).\\7\\ The Reference Price, for purposes of Rule 11.13(c)(4... Pause Trigger Price.\\8\\ \\7\\ Pursuant to Rule 2128(c)(1), a security with a Reference Price of greater...

  15. 76 FR 7884 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2011-02-11

    ... rules (e.g., proprietary traders). See Notice, p. 16; 75 FR 80091, at 80095. See also Securities... register with ISE every associated person acting in the capacity of a sole proprietor, officer, partner...\\ Proposed Supplementary Material to Rule 313.07 exempts members that are sole proprietors from this...

  16. Human Rights, Human Needs, Human Development, Human Security : Relationships between four international 'human' discourses

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    textabstractHuman rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each

  17. Statement to the international conference on security of radioactive sources. Vienna, 11 March 2003

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    Around the world, radioactive sources have been used for decades to benefit humankind - to diagnose and treat illnesses, to monitor oil wells and water aquifers, to preserve food, as well as for many other uses. Millions of sources have been distributed worldwide over the past 50 years, with hundreds of thousands currently in use. Most of these sources, such as those in smoke detectors, are weakly radioactive and individually pose little radiological risk. However, about 12 000 industrial radiography sources are supplied annually; more than 10 000 medical radiotherapy units are in use. These types of sources - and others such as those contained in thermo-electric generators - are significant from a safety and security standpoint, because they contain potentially lethal quantities of radioactive material. To protect the public from the hazards of ionizing radiation, cradle-to-grave control is essential for these radioactive sources. For many years the IAEA has been helping States to strengthen their national regulatory infrastructures, to ensure that such radioactive sources are appropriately regulated at all times. Until recently, our emphasis has been on the safety of radioactive sources, with source security as one aspect of safety. However, in the wake of the September 2001 terrorist attacks, and the stark awareness of the potential for radioactive sources to be used in malevolent acts, source security has taken on a new urgency. But while a number of countries are stepping up relevant security measures, many others lack the resources or the national structures to effectively control radioactive sources

  18. 76 FR 5225 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-01-28

    ... Securities''), a wholly-owned subsidiary of Ballista Holdings, is an electronic access member of the Exchange... Interests''). ISE Holdings and its subsidiaries and affiliates do not have any voting or other ``control... interest in instances where an exchange is affiliated with one of its members, and (2) the potential for...

  19. 78 FR 79037 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-27

    ... change a non-substantive word to update the sentence structure of paragraph (a). [ssquf] ISE Rule 715... Rule Change to Make Non-Controversial Changes to ISE Rules December 20, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...

  20. Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

    NARCIS (Netherlands)

    Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Famaey, Jeroen; Velan, Petr; Celeda, Pavel

    This article is a report of the IFIP AIMS 2014, which was held at Masaryk University, Czech Republic from June 30 to July 3, 2014. AIMS 2014 focused on the theme “Monitoring and Securing Virtualized Networks and Services‿. The focus of the 2014 edition of the AIMS conference series was re-defined in

  1. 77 FR 16290 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-03-20

    ... with the Telemarketing Consumer Fraud and Abuse Prevention Act of 1994 (``Prevention Act'').\\4\\ The... rules in light of changing telemarketing practices and technology.\\8\\ \\7\\ See Telemarketing and Consumer Fraud and Abuse Prevention Act; Determination that No Additional Rulemaking Required, Securities...

  2. 77 FR 19399 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-03-30

    ... governance documents of Alpha Beta Netherlands Holding N.V., a holding company organized under the laws of... securities, and to remove impediments to and perfect the mechanism of a free and open market and a national market system. Specifically, the Exchange believes that the Proposed Rule Change will clarify the...

  3. 75 FR 39070 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2010-07-07

    ..., commodities, and currency without actually trading futures or taking physical delivery of the underlying asset... that has received certain exemptive relief from the SEC to allow secondary market trading in the ETF... would need to be modified to accommodate trading characteristics of different securities. \\6\\ See...

  4. 77 FR 69910 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Withdrawal of...

    Science.gov (United States)

    2012-11-21

    ...-2012-22). \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. \\3\\ See Securities Exchange Act Release No... J. Simon, Secretary and General Counsel, ISE, dated May 4, 2012. \\7\\ See Order Instituting... Elizabeth M. Murphy, Secretary, Commission, from Michael J. Simon, Secretary and General Counsel, ISE, dated...

  5. 77 FR 58432 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Designation of...

    Science.gov (United States)

    2012-09-20

    ... from the Exchange.\\11\\ \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. \\3\\ See Securities Exchange Act... J. Simon, Secretary and General Counsel, ISE, dated May 4, 2012. \\7\\ See letters to Elizabeth M... June 19, 2012. \\8\\ See letter to Elizabeth M. Murphy, Secretary, Commission, from Michael J. Simon...

  6. 78 FR 69714 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-11-20

    ... in Select Symbols. A Priority Customer is by definition not a broker or dealer in securities, and... amend the Exchange's Schedule of Fees (1) to adopt a definition of ``affiliate'' for the purpose of aggregating affiliated Member fees for the Firm Fee Cap, (2) to increase the taker fee for Priority Customers...

  7. 78 FR 24265 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-24

    ... charging Non-ISE Market Maker orders a higher rate than the fee charged to Market Maker, Firm Proprietary... discriminatory to assess a higher transaction fee to Non-ISE Market Makers because the Exchange incurs costs... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69394; File No. SR-ISE-2013-33] Self-Regulatory...

  8. Security Assistance International Logistics, Training, and Technical Assistance Support Policy and Responsibilities

    Science.gov (United States)

    2000-01-24

    assessment will be drawn from a variety of sources, such as checklists prepared by the in-country SAO, in-country surveys, and security assistance re...activity will prepare, coordinate, and execute the lease agreement with industry after HQDA (SAUS-IA- DSE ) obtains ASA(AL&T) approval as appropriate. d

  9. 77 FR 33543 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2012-06-06

    ... platforms (e.g., equity and ETF, index, derivatives, futures, foreign currency, and even commodities.../trading/metals/precious/ProductOverride/SO-silver-options.html , strike prices for options on futures may... Price Intervals for Certain Option Classes May 31, 2012. Pursuant to Section 19(b)(1) of the Securities...

  10. 77 FR 37082 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-20

    ... schemes. In addition, the Exchange believes that charging Non-ISE Market Maker orders a higher rate than... discriminatory to assess a higher transaction fee on Non- ISE Market Makers because the Exchange incurs costs... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67201; File No. SR-ISE-2012-49] Self-Regulatory...

  11. 77 FR 35723 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-14

    ... orders different rates. And for a period of time, the Exchange charged a higher fee for large size... Customer orders \\10\\ and no longer charges different rates for these orders. The Exchange now proposes to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67168; File No. SR-ISE-2012-46] Self-Regulatory...

  12. Global Security in the Twenty First Century - The Challenge to International Organizations, Alliances and Coalitions

    National Research Council Canada - National Science Library

    Seymour, N

    1999-01-01

    ... for Security and Cooperation in Europe (OSCE) Naturally, it would be too simplistic for the answer to be either one or the other; the probable solution is more likely to be a hybrid that embodies the strengths of both, not to mention the UN.

  13. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    International Nuclear Information System (INIS)

    Song, S. H.; Lee, M. S.; Kim, T. H.; Park, C. H.; Park, S. P.; Kim, H. S.

    2014-01-01

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system

  14. Institutionalization of Information Security: Case of the Indonesian Banking Sector

    Science.gov (United States)

    Nasution, Muhamad Faisal Fariduddin Attar

    2012-01-01

    This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information…

  15. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was

  16. Quantifying Security Threats and Their Potential Impacts: A Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2010-01-01

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.

  17. A study of authorization architectures for grid security

    International Nuclear Information System (INIS)

    Pang Yanguang; Sun Gongxing; Pei Erming; Ma Nan

    2006-01-01

    Grid security is one of key issues in grid computing, while current research focus is put on the grid authorization. There is a brief discussion about the drawback of the common GSI (Grid Security Infrastructure) authorization firstly, then analysis is made on the latest several grid authorization architectures, such as structures, policy descriptions, engines, applications, and finally their features are summarized. (authors)

  18. The Internal and External Dimensions of Security in the Himalayas -From non-alignment to multi-alignment

    DEFF Research Database (Denmark)

    Schmidt, Johannes Dragsbæk; Thapa, Manish

    This contribution offers a critical perspective of the internal and external dimensions of security and conflicts in the Himalayas. The two main actors are India and China while Pakistan plays a role in the Kashmir conflict. With the recent rapprochement between the BJP-government led by Narendra...... Modi and the Communist party led by Xi Jinping the two countries are attempting to keep a global and regional geo-economic momentum while the US appears to be more inclined to return to a more traditional geo-political state of affairs....

  19. International New Venture Legitimation: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Romeo V. Turcan

    2013-11-01

    Full Text Available There is limited theoretical understanding and empirical evidence for how international new ventures legitimate. Drawing from legitimation theory, this study fills in this gap by exploring how international new ventures legitimate and strive for survival in the face of critical events during the process of their emergence. It is a longitudinal, multiple-case study research that employs critical incident technique for data collection, analysis, and interpretation. Following theory driven sampling, five international new ventures were selected that were operating in the software sector in the UK, and had internationalized and struggled for survival during the dotcom era. Grounded in data, this study corroborates a number of legitimation strategies yielded by prior research and refutes others. It further contributes to our understanding of international new venture legitimation by suggesting new types of legitimation strategies: technology, operating, and anchoring. Studying international new ventures through theoretical lenses of legitimation is a promising area of research that would contribute to the advancement of international entrepreneurship theory.

  20. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. A strategy study on international nuclear cooperation

    International Nuclear Information System (INIS)

    Chang, Hong Rae; Kim, Kyung Pyo; Kim, Young Min; Shin, Kyung Hye; Yoon, Sung Won; Lee, Myung Ho; Lee, Jong Hee; Hong Young Don

    1995-12-01

    The implementing methodologies suggested from this study cover the following: 1) strategies for the promotion of the nation's leading roles in such international organizations as the IAEA and OECD/NEA; 2) strategies for the implementation of national nuclear policy, positively coping with international nuclear trends; 3) strategies for the promotion of technical cooperation with the Russian Federation to introduce essential nuclear technology by utilizing its new environment of science and technology. 39 tabs., 28 figs., 64 refs. (Author)

  2. International Journal of Humanistic Studies: Submissions

    African Journals Online (AJOL)

    Author Guidelines. The International Journal of Humanistic Studies invites submissions of research-based studies addressing current issues in the area of Humanistic Studies. Manuscripts should be between 6000 and 9000 words. The article must have a clear, crisp and concise title. Manuscripts are refereed anonymously; ...

  3. The International Criminal Court as a Component of U.S. National Security Strategy

    Science.gov (United States)

    2012-04-21

    determining if U.S. accession is advisable, and recommend potential actions to progress toward it. 15. SUBJECT TERMS Lawfare , Contractor, ASPA...Security Strategy FORMAT: Civilian Research Project DATE: 21 April 2012 WORD COUNT: 11,629 PAGES: 46 KEY TERMS: Lawfare , Contractor...through the ICC. The U.S. tries to avoid scenarios where membership in the ICC gives a non-U.S. party an avenue of “ lawfare ” against the United States

  4. Exploring the Security Dimension of Sino-US Trade Asymmetry. Implications for the International Trade System

    Science.gov (United States)

    2010-01-01

    Jan Nederveen Pieterse describes the world economy as a Ponzi scheme , “a giant pyramid selling scheme (and) a strange cycle in which trade deficits...relationship through scheming . The RMB-USD peg could fathomably become a sore grievance in the relationship and be used as an excuse for trade...07-Littlefield.indd 90 1/29/10 9:50:11 AM Exploring the Security Dimension of Sino–US Trade Asymmetry Implications for

  5. 78 FR 23806 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-22

    ... not Priority Customers, Non-MIAX Market Makers, Non-Member Broker-Dealers, and Firms. Below is a chart... Not a 0.25 0.025 Priority Customer Non-MIAX Market Maker 0.45 0.045 Non-Member Broker-Dealer........ 0... a broker or dealer in securities, and (ii) does not place more than 390 orders in listed options per...

  6. The Key Conceptions of Social Security: the International Practice and Ukraine

    Directory of Open Access Journals (Sweden)

    Dluhopolska Tetiana I.

    2017-02-01

    Full Text Available The world-wide globalization processes and the political-military conflicts have exacerbated the problem of social security of the people of various world countries, which is usually seen from the perspective of both the State and the individual citizen. The article is aimed at analyzing the existing conceptions of social security from different perspectives – political, economic efficiency, and narrative. An analysis of political theories of social security (majority rational voting; pressure groups has determined that they are based on the redistribution processes, and winning of the individual economic agents is achieved in the political struggle for various «social prizes». An analysis of theories of efficiency (optimal redistribution; optimal retirement insurance; prodigal father; misguided Keynesian; longevity insurance; government economizes on administration costs; return on human capital investment has determined that they rely on market «fiasco» and can help in understanding which from the social protection programs minimize market failures. An analysis of the descriptive (narrative theories (chain letters; lump of labor; monopoly capitalism; nearly rational policy has determined that they are difficult subject to the mathematical interpretation and partially repeat ideas of the previous concepts.

  7. International panel to address state, local efforts to increase energy security, sustainability

    OpenAIRE

    Trulove, Susan

    2009-01-01

    Climate change and energy are international issues. Following the maxim, "Think globally, act locally," a now international group first launched in Germany is hosting a panel discussion on the topic, "A Transatlantic Perspective on Climate Change and Energy Policy" on Thursday, Sept. 24, from 10 a.m. to noon at Squires Student Center in Brush Mountain Room A.

  8. New Zealand; Financial Sector Assessment Program—Detailed Assessments of Observance of Standards and Codes—International Organization of Securities Commission (IOSCO)—Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2004-01-01

    This paper evaluates the Observance of Standards and Codes on the International Organization of Securities Commission (IOSCO) Objectives and Principles of Securities Regulation for New Zealand. New Zealand equity markets are comparatively small with market capitalization of about 44 percent of GDP. Reflecting a preference for property investment, ownership of New Zealand-listed equities remains mostly in the hands of offshore investors and domestic institutional investors, with only about one...

  9. Is international election observation credible? Evidence from Organization for Security and Co-operation in Europe missions

    Directory of Open Access Journals (Sweden)

    Max Bader

    2014-07-01

    Full Text Available While international election observations missions often aim to present generalizable claims about the quality and integrity of an election, their findings are rarely based on a representative sample of observations, undermining the credibility of the missions. Bias in the selection of polling stations, among other things, can inflate or deflate the percentage of polling stations where observers find significant flaws. This article uses original data from Organization for Security and Co-operation in Europe (OSCE election observation missions to illustrate the nature of the problem of selection bias in international election observation, and show how the percentage of ‘bad’ polling stations (in the absence of selection bias can be estimated through a weighting procedure. The article finds that, while there is a strong degree of selection bias, this does not significantly impact the overall percentage of ‘bad’ polling stations that is reported by OSCE observation missions.

  10. Global Food Security Index Studies and Satellite Information

    Science.gov (United States)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  11. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  12. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    Directory of Open Access Journals (Sweden)

    Sadeghizadeh Atefeh

    2009-06-01

    Full Text Available Abstract Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries.

  13. International Journal of Humanistic Studies: Editorial Policies

    African Journals Online (AJOL)

    International Journal of Humanistic Studies is an annual peer-reviewed Journal. It focuses on every aspect of Humanistic Studies and has a strong interdisciplinary thrust. Contributions are accepted from the fields of Philosophy, English Language, Literature, History, Theatre Arts, Music, Communication Arts, Anthropology, ...

  14. Emerging Donors Study | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-20

    Oct 20, 2010 ... The four countries that were studied are Brazil, India, China and South Africa. The specific objectives of the studies were to: understand each country's approach to international development assistance and cooperation in developing countries; understand their approach to research for development in ...

  15. The Department of Homeland Security’s Role in Protecting the National Economy

    Science.gov (United States)

    2017-09-01

    Revolution: A New Customs Security Framework to Secure and Facilitate Small Business eCommerce (New York: Center for Strategic and International Studies...Security Framework to Secure and Facilitate Small Business eCommerce . New York: Center for Strategic and International Studies, Rowman and Littlefield

  16. A study on energy security and nuclear energy role

    International Nuclear Information System (INIS)

    Ujita, Hiroshi

    2011-01-01

    Energy security was a major concern for OECD governments in the early 1970s. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. Here, an energy security concept has been proposed, which is defined by time frame and space frame as well. Wide-meaning energy security is divided broadly into two categories. One is short-term (∼10 y) energy crisis, which is narrow-meaning energy security. Short-term energy crisis is further divided into contingent crisis, such as energy supply chain (sealane) interruption due to conflict, accident, terrorism, etc., and structural crisis, such as price fluctuations, supply shortage, energy demand increase in Asia, technology development stagnation, etc. The other is long-term (∼100 y) energy crisis and global energy problems, such as fossil fuel exhaustion and global warming. (author)

  17. The International Traffic in Arms Regulations: An Impediment to National Security

    National Research Council Canada - National Science Library

    Mahon, Steven G

    2008-01-01

    The International Traffic in Arms Regulations (ITAR) is putting United States (U.S.) advanced technology and weapons companies at a competitive disadvantage, particularly in the fields of satellite manufacturing and technology...

  18. Study on Cyber Security and Threat Evaluation in SCADA Systems

    Science.gov (United States)

    2012-03-01

    http://www.isa.org/Template.cfm?Section=Shop_ISA&Template=/ Ecommerce /ProductDisplay.cfm&Produ ctid=9665 • Integrating Electronic Security into...the Manufacturing and Control Systems Environment, ISA, 2004 - http://www.isa.org/Template.cfm?Section=books&template= Ecommerce /FileDisplay.cfm...template= Ecommerce /FileDisplay.cfm&ProductID=738 0&file=Preview.pdf • Peterson, D. and Howard, D. "Cyber Security for the Electric Sector," September 12

  19. Security Testing in Agile Web Application Development - A Case Study Using the EAST Methodology

    CERN Document Server

    Erdogan, Gencer

    2010-01-01

    There is a need for improved security testing methodologies specialized for Web applications and their agile development environment. The number of web application vulnerabilities is drastically increasing, while security testing tends to be given a low priority. In this paper, we analyze and compare Agile Security Testing with two other common methodologies for Web application security testing, and then present an extension of this methodology. We present a case study showing how our Extended Agile Security Testing (EAST) performs compared to a more ad hoc approach used within an organization. Our working hypothesis is that the detection of vulnerabilities in Web applications will be significantly more efficient when using a structured security testing methodology specialized for Web applications, compared to existing ad hoc ways of performing security tests. Our results show a clear indication that our hypothesis is on the right track.

  20. Work ability and health of security guards at a public University: a cross-sectional study.

    Science.gov (United States)

    Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante

    2016-01-01

    to evaluate the work ability and health status of security guards at a public University. a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged.

  1. Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs

    Directory of Open Access Journals (Sweden)

    Kurnianto Ari

    2018-01-01

    Full Text Available Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.

  2. Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs

    Science.gov (United States)

    Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji

    2018-02-01

    Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.

  3. Internalized stigma in psoriasis: A multicenter study.

    Science.gov (United States)

    Alpsoy, Erkan; Polat, Mualla; FettahlıoGlu-Karaman, Bilge; Karadag, Ayse Serap; Kartal-Durmazlar, Pelin; YalCın, Basak; Emre, Selma; Didar-Balcı, Didem; Bilgic-Temel, Asli; Arca, Ercan; Koca, Rafet; Gunduz, Kamer; Borlu, Murat; Ergun, Tulin; Dogruk-Kacar, Seval; Cordan-Yazici, Ayca; Dursun, Pınar; BilgiC, Ozlem; Gunes-Bilgili, Serap; Sendur, Neslihan; Baysal, Ozge; Halil-Yavuz, Ibrahim; Yagcioglu, Gizem; Yilmaz, Ertan; Kavuzlu, Ufuk; Senol, Yesim

    2017-08-01

    Internalized stigma is the adoption of negative attitudes and stereotypes of the society regarding a person's illness. It causes decreased self-esteem and life-satisfaction, increased depression and suicidality, and difficulty in coping with the illness. The primary aim of this study was to investigate the internalized stigma state of psoriatic patients and to identify the factors influencing internalized stigma. The secondary aim was to identify the correlation of internalized stigma with quality of life and perceived health status. This multicentre, cross-sectional study comprised 1485 patients. There was a significant positive correlation between mean values of Psoriasis Internalized Stigma Scale (PISS) and Psoriasis Area and Severity Index, Body Surface Area, Dermatological Life Quality Index and General Health Questionnaire-12 (P percieved health score (P = 0.001), early onset psoriasis (P = 0.016), family history of psoriasis (P = 0.0034), being illiterate (P < 0.001) and lower income level (P < 0.001) were determinants of high PISS scores. Mean PISS values were higher in erythrodermic and generalized pustular psoriasis. Involvement of scalp, face, hand, genitalia and finger nails as well as arthropathic and inverse psoriasis were also related to significantly higher PISS scores (P = 0.001). Our findings imply that psoriatic patients experience high levels of internalized stigma which are associated with psoriasis severity, involvement of visible body parts, genital area, folds or joints, poorer quality of life, negative perceptions of general health and psychological illnesses. Therefore, internalized stigma may be one of the major factors responsible from psychosocial burden of the disease. © 2017 Japanese Dermatological Association.

  4. Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia.

    Science.gov (United States)

    Frohde, Kenny; Brooks, David J

    2014-01-01

    Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.

  5. CompTIA Security+ Deluxe Study Guide Exam SY0-301

    CERN Document Server

    Dulaney, Emmett

    2011-01-01

    Get a host of extras with this Deluxe version including a Security Administration Simulator!  Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide, the Deluxe Edition gives you over additional hands-on lab exercises and study tools, three additional practice exams, author videos, and the exclusive Security Administration simulator. This book is a CompTIA Recommended product. Provides 100% coverage of all e

  6. BIOMOVS: an international model validation study

    International Nuclear Information System (INIS)

    Haegg, C.; Johansson, G.

    1988-01-01

    BIOMOVS (BIOspheric MOdel Validation Study) is an international study where models used for describing the distribution of radioactive and nonradioactive trace substances in terrestrial and aquatic environments are compared and tested. The main objectives of the study are to compare and test the accuracy of predictions between such models, explain differences in these predictions, recommend priorities for future research concerning the improvement of the accuracy of model predictions and act as a forum for the exchange of ideas, experience and information. (author)

  7. BIOMOVS: An international model validation study

    International Nuclear Information System (INIS)

    Haegg, C.; Johansson, G.

    1987-01-01

    BIOMOVS (BIOspheric MOdel Validation Study) is an international study where models used for describing the distribution of radioactive and nonradioactive trace substances in terrestrial and aquatic environments are compared and tested. The main objectives of the study are to compare and test the accuracy of predictions between such models, explain differences in these predictions, recommend priorities for future research concerning the improvement of the accuracy of model predictions and act as a forum for the exchange of ideas, experience and information. (orig.)

  8. Undergraduate International Studies and Foreign Language Program

    Science.gov (United States)

    Office of Postsecondary Education, US Department of Education, 2012

    2012-01-01

    The Undergraduate International Studies and Foreign Language Program provides funds to institutions of higher education, a consortia of such institutions, or partnerships between nonprofit organizations and institutions of higher education to plan, develop, and implement programs that strengthen and improve undergraduate instruction in…

  9. Fluid Studies on the International Space Station

    Science.gov (United States)

    Motil, Brian J.

    2016-01-01

    Will discuss the recent activities on the international space station, including the adiabatic two phase flow, capillary flow and interfacial phenomena, and boiling and condensation. Will also give a historic introduction to Microgravity Studies at Glenn Research Center. Talk will be given to students and faculty at University of Louisville.

  10. Employability of Graduates from International Development Studies ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project addresses the lack of quantitative and qualitative employment data for students who graduate from Canadian university programs in international development studies (IDS) at the undergraduate and graduate levels. There are two important consequences for IDS programs: -their ability to prepare students for ...

  11. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  12. The Glioma International Case-Control Study

    DEFF Research Database (Denmark)

    Amirian, E. Susan; Armstrong, Georgina N; Zhou, Renke

    2016-01-01

    describe the Glioma International Case-Control (GICC) Study (recruitment, 2010-2013), a study being conducted by the Genetic Epidemiology of Glioma International Consortium that integrates data from multiple data collection sites, uses a common protocol and questionnaire, and includes biospecimen......Decades of research have established only a few etiological factors for glioma, which is a rare and highly fatal brain cancer. Common methodological challenges among glioma studies include small sample sizes, heterogeneity of tumor subtypes, and retrospective exposure assessment. Here, we briefly...... collection. To our knowledge, the GICC Study is the largest glioma study to date that includes collection of blood samples, which will allow for genetic analysis and interrogation of gene-environment interactions....

  13. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon.

    Science.gov (United States)

    Parmar, Parveen Kaur; Agrawal, Pooja; Goyal, Ravi; Scott, Jennifer; Greenough, P Gregg

    2014-01-01

    Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women.

  14. Fissile material and international security in the post-Cold War world

    International Nuclear Information System (INIS)

    Luongo, K.N.

    1995-01-01

    Given the number of years this organization has devoted to the issue, the INMM must find it quite interesting that the control of fissile materials has become such a high profile issue in the policy and political communities. But, this evolution in policy is a natural outgrowth of the changing world situation. While just ten years ago the United States and the Soviet Union were churning out the fissile materials needed for weapons, today these former rivals are working together, hand in hand, to corral the danger posed by these materials. And, while it is clear that the world no longer lives on the edge of nuclear war, the nuclear danger still exists, though in a less obvious and perhaps more insidious form. It is a great challenge in this post Cold War-world to contain this nuclear threat. It is prudent and necessary for the United States to be in the forefront of efforts to address and tame this problem. The fundamental threat posed by the proliferation of nuclear weapons and materials is a direct challenge to US and world security. President Clinton has clearly recognized the changed nature of the nuclear danger. To meet this challenge, he also labored to put in place a comprehensive and integrated plan for addressing this threat. The Department of Energy has a unique role in this effort because, as an institution with man decades of experience in fissile material matters, it is able to provide expertise and technical analyses which are essential in defining and implementing policy prescriptions. The President's comprehensive plan to prevent nuclear proliferation and reduce the danger posed by weapons-usable nuclear materials has four essential elements: (1) secure existing stockpiles; (2) limit production and use; (3) eliminate warheads; and (4) strengthen the nonproliferation regime

  15. Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan

    Science.gov (United States)

    Nabi, Syed Irfan; Nabi, Syed Waqar; Tipu, Syed Awais Ahmed; Haqqi, Bushra; Abid, Zahra; Alghathbar, Khaled

    The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9th globally in 2009 in terms of subscription. The research methodology was case study based in which perceptions were gathered as well as thematic analysis of the interviews was done. The research focus is on breach of data integrity and confidentiality by the internal users in the industry and the perception of improvement, if any, of the data security due to implementation of security management policies and controls. The results show that information security measure are perceived to have a positive impact on reducing data confidentiality and integrity breaches but still falls short of what is required. It concludes that security policies might improve the situation provided, firstly, that the top managements takes information security seriously, and secondly, the non-technical human aspects of the issues are taken into consideration.

  16. Three protocols for securing the data pipeline of the international supply chain

    NARCIS (Netherlands)

    Pruksasri, P.; Van den Berg, J.; Hofman, W.

    2012-01-01

    In order to make the international supply chain system highly efficient in worldwide transportation of goods, its business processes should be supported by high quality information systems that, “24x7”, provide the right data, at the right time, at the right place, to the right person. To do so, the

  17. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Science.gov (United States)

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  18. Damage invariant and high security acquisition of the internal fingerprint using optical coherence tomography

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-11-01

    Full Text Available (owing to eczema, in this case) and presentation attacks. The surface fingerprint was very poorly affected by severe damage, with minutiae detection accuracy diminished from 88.7% to 4.7%. The internal fingerprint was far less affected by severe damage...

  19. Promoting International Energy Security. Volume 1: Understanding Potential Air Force Roles

    Science.gov (United States)

    2012-01-01

    obtain additional information, contact Distribution Services: Telephone: (310) 451 -7002; Fax: (310) 451 -6915; Email: order@rand.org Library of...raise the temperature of one pound of water one degree Fahrenheit ) DoD Department of Defense EIA U.S. Energy Information Administration IEA International

  20. 77 FR 38100 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Instituting...

    Science.gov (United States)

    2012-06-26

    ... for Trading on the Exchange June 20, 2012. I. Introduction On March 9, 2012, the International...,'' thereby implying that it would do so as well when computing the settlement value of the proposed options... which ISE purportedly would rely to compute the NAV of the SPY ETF would not be available until hours...

  1. The DISAM Journal of International Security Assistance Management. Volume 31, Number 2, August 2009

    Science.gov (United States)

    2009-08-01

    military Commanders, U.S. government agencies, and international partners “to ensure that all elements of national power are brought to bear in...ict to involve the use of such weapons. While major regular war is currently in a state of hibernation , one should not forget that in 1929 the

  2. Review: ICCS International Civics and Citizenship Study

    Directory of Open Access Journals (Sweden)

    Anu Toots

    2010-11-01

    Full Text Available In November 2010 the largest international study ever conducted on civic education in secondary schools has been released in Brussels. The study was performed under the auspices of the International Association for the Evaluation of Educational Achievement (IEA, an independent consortium that brings together educational researchers and policy makers in 62 countries around the world. The IEA is probably more widely known in connection of large-scale comparative studies on educational assessment in math and science (TIMSS and in reading (PIRLS. Yet, the association has longstanding and impressive expertise also in civic education. The first study in this area has been carried out already in 1971 (Torney et al., 1975, the second – so called CIVED in 1999 (Torney-Purta et al., 2001 and now, ten years later, 38 counties around the world participated in the third study – the IEA International Civic and Citizenship Education Study (ICCS. The study tested in 2008–2009 over 140,000 lower secondary students, over 62,000 teachers and headmasters from 5,300 schools in order to analyse how young people are prepared to undertake their roles as citizens.

  3. Review of the international forum on peaceful use of nuclear energy and nuclear security. Taking the lessons learned from Fukushima Daiichi Nuclear Power Plant accident to the 2012 Seoul nuclear security summit

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Suda, Kazunori; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2012-06-01

    The Japan Atomic Energy Agency (JAEA) held '2011 International Forum on the Peaceful Use of Nuclear Energy and Nuclear Security - Taking the lessons learned from Fukushima Daiichi Nuclear Power Plant Accident to the 2012 Seoul Nuclear Security Summit-' on 8 and 9 December, 2011. It intended to articulate effective strategies and measures for strengthening nuclear security using lessons learned from the Fukushima Nuclear Accident. Moreover, it was expected to explore comprehensive approaches which could contribute to enhancing both nuclear safety and security in order to support sustainable and appropriate development of the peaceful use of nuclear energy. This report includes abstracts of keynote speeches, summary of panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report, excepts presentation materials. (author)

  4. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  5. Statement of participants at the International Conference on Can Slovakia secure energy supply and sustainable development without nuclear?

    International Nuclear Information System (INIS)

    Mikus, T.; Suchomel, J.

    2004-01-01

    The participants at the Conference called on decision makers both in the European Union (EU) and in Slovakia to provide fair treatment to nuclear power compared with other energy sources, especially with renewable, without prejudice to nuclear safety. This implies ensuring equality in terms of economics, tax, and accounting for externalities. The participants called on the Slovak government to initiate studies that compare the full life-cycle costs, impacts and risks, across the spectrum of energy sources and uses. They should also internalize the external costs. The participants called for a debate on the Slovak energy needs, taking into account the environmental impact of all potential sources of energy and the costs of providing electricity from those sources, and in addition a rational and objective analysis of the security of supply of those sources. It is necessary to have a range of sources for electricity generation that are cost effective and reliable, and respect the environment. The Slovak economy cannot withstand a sudden loss of its guaranteed energy supply. The participants believe that the major government role is setting overall policy for the economy, energy and the environment, with an adequate base in legislation and institutional competence. The Slovak government should have clear strategies for achieving self-sufficient energy-policy goals with reserve power and for meeting climate-change and air-quality goals. The Conference concluded that the nuclear option should remain open in Slovakia, as part of a balanced energy mix, in line with developments abroad and the EU Green Paper from 2000; the alternative is Slovak's failure to secure an affordable energy supply for its citizens. The participants supported the completion of Mochovce 3, 4, complying with enhanced safety requirements, as the most effective option. In Slovenske elektrarne, a.s. (SE) privatization, the government should insist on as large an involvement of Slovak firms in the

  6. My Critique is Bigger than Yours: Constituting Exclusions in Critical Security Studies

    Directory of Open Access Journals (Sweden)

    David Roger Mutimer

    2009-10-01

    Full Text Available Critical Security Studies proceeds from the premise that words are world-making, that is that the ways we think about security are constitutive of the worlds of security we analyse. Turned to conventional security studies and the practices of global politics, this critical insight has revealed the ways in which the exclusions that are the focus of this conference have been produced. Perhaps most notable in this regard has been David Campbell's work, showing how the theory and practice of security are an identity discourse producing both insides and outsides, but the production of excluded others is a theme that runs through the critical scholarship on security in the past decade or more. This article turns the critical security studies gaze on itself, to explore the field's own complicity in the production of exclusions. The article reads three important instances of critical security studies for the inclusions and exclusions they produce: Ken Booth's Theory of World Securitv, the epilogue to David Campbell's Writing Security, and the CASE Collective Manifesto. The article concludes by asking about the nature of the inclusions and exclusions these divisions produce and the politics which those exclusions, in turn, (reproduce.

  7. Security information in production and operations: a study on audit trails in database systems

    Directory of Open Access Journals (Sweden)

    Rodrigo Roratto

    2015-09-01

    Full Text Available Special care should be taken to verify the integrity and to ensure that sensitive data is adequately protected. One of the key activities for data loss prevention is anaudit. And in order to be able to audit a system, it is important to have reliable records of its activities. Systems that store critical data, whether financial or productive, must have features such as audit log, also called audit trail, which records all activities on critical data. This allows to identify harmful actions that can be internal or external, intentionally or unintentionally caused. Therefore, this paper presents major studies in security audit trail (audit log, especially records of logs, and it presents what is available in terms of commercial tools and what they offer.

  8. The DISAM Journal of International Security Assistance Management. Volume 30, Number 1, March 2008

    Science.gov (United States)

    2008-03-01

    Republic, Finland, Germany, Italy, Japan, Kenya, Korea, Kuwait, Lithuania, Malaysia, Mexico, Morocco, New Zealand, Nigeria, Pakistan, Philippines , Poland...destruction • Failed and failing states • States enriched with oil profi ts and discontented with the current international order • Centrifugal ...beyond a village hand- pump or local clinic 35 KVA generator 70The DISAM Journal, March 2008 Day-to-day business is often carried out primarily through

  9. Understanding and managing international student security needs in Australia : the case of Monash University

    OpenAIRE

    Forbes-Mewett, Helen

    2017-01-01

    The rapid growth in the number of international students choosing Australia as a preferred place for tertiary education has brought many benefits and challenges to both students and universities. Australia has become a temporary home for many thousands of students prepared to pay large sums of money for the opportunity to advance their education and better their lives in a location that promotes itself as safe and welcoming. Nonetheless, cash-strapped universities should be min...

  10. The United Nations and One Health: the International Health Regulations (2005) and global health security.

    Science.gov (United States)

    Nuttall, I; Miyagishima, K; Roth, C; de La Rocque, S

    2014-08-01

    The One Health approach encompasses multiple themes and can be understood from many different perspectives. This paper expresses the viewpoint of those in charge of responding to public health events of international concern and, in particular, to outbreaks of zoonotic disease. Several international organisations are involved in responding to such outbreaks, including the United Nations (UN) and its technical agencies; principally, the Food and Agriculture Organization of the UN (FAO) and the World Health Organization (WHO); UN funds and programmes, such as the United Nations Development Programme, the World Food Programme, the United Nations Environment Programme, the United Nations Children's Fund; the UN-linked multilateral banking system (the World Bank and regional development banks); and partner organisations, such as the World Organisation for Animal Health (OIE). All of these organisations have benefited from the experiences gained during zoonotic disease outbreaks over the last decade, developing common approaches and mechanisms to foster good governance, promote policies that cut across different sectors, target investment more effectively and strengthen global and national capacities for dealing with emerging crises. Coordination among the various UN agencies and creating partnerships with related organisations have helped to improve disease surveillance in all countries, enabling more efficient detection of disease outbreaks and a faster response, greater transparency and stakeholder engagement and improved public health. The need to build more robust national public human and animal health systems, which are based on good governance and comply with the International Health Regulations (2005) and the international standards set by the OIE, prompted FAO, WHO and the OIE to join forces with the World Bank, to provide practical tools to help countries manage their zoonotic disease risks and develop adequate resources to prevent and control disease

  11. The DISAM Journal of International Security Assistance Management. Volume 24, Number 3, Spring 2002

    Science.gov (United States)

    2002-01-01

    potentially detracting from the overall benefit, a cooperative solution between the MoD, MPRI, ODC and the team leader conducting the new equipment training...the CLSSC and the newly developed International Military Operations Center (IMOC). This innovate solution effectively tripled the training value of...Subtotal, East Asia and the Pacific 168.877 169.750 166.250 GLOBAL Human Rights and Demo. Fund [4] 13.421 13.500 13.000 Partnerships to Eliminate Sweatshops

  12. Proceedings of SES International Conference on Can Slovakia secure energy supply and sustainable development without nuclear? Go Nuke Slovakia!

    International Nuclear Information System (INIS)

    2004-01-01

    The Conference proceedings included 28 papers. The Conference included the following sessions: (I): International views; (II): National views; (III): Industry views. Focused in its objective, the is aimed to send a clear, hard-hitting message to decision-makers. This is that: Slovakia cannot secure future energy supply, if it does not complete its partially built reactors and if it closes its safe and effective ones. Nuclear has to remain an indispensable part of the country's future energy mix. The event was opened with invited presentations by officials at the highest level of organisations such as the IAEA, the IEA, OECD/NEA, the NEI, the WNA and WANO, as well as the European Commission and Parliament. This line-up was followed by a host of speakers from the political and nuclear industrial arenas in Slovakia, the Czech Republic, Finland, Hungary and the Russian Federation

  13. Ready to Respond: Case Studies in Campus Safety and Security

    Science.gov (United States)

    Hyatt, James A.

    2010-01-01

    Is your campus primed for the next big emergency? The National Campus Safety and Security Project (NCSSP), led by NACUBO, sought to help colleges and universities develop comprehensive emergency management plans that address the four phases of emergency management: prevention/mitigation, preparedness, response, and recovery. A major component of…

  14. A study of dorsal vein pattern for biometric security

    African Journals Online (AJOL)

    Nafiisah

    There is a distinctive pattern of veins at the back of the hand. When a fist shape is made by the hand, a unique pattern of blood vessel is formed. This pattern can be used as a biometric in security systems. However, there are a number of challenges in this approach. The position of the hand while capturing the pattern and ...

  15. A study of institutional environment and household food security at ...

    African Journals Online (AJOL)

    cntaganda

    also the much wanted institutional support being exposed. Key words: Food access, institutional environment, food production, district development plans, farmer cooperatives, household food security. 1. Introduction. Rwanda is .... institutions and their functions in the following definition: 'Formal or informal rules that govern ...

  16. Secure Cloud Computing Implementation Study For Singapore Military Operations

    Science.gov (United States)

    2016-09-01

    Computing in Healthcare. Adapted from [13]. Benefits Cloud Computing  Clinical Research  Electronic Medical Records  Collaboration Solutions...medium to send orders to tactical action units, the cloud should also contain a feature to verify that the action units have received and understood the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SECURE CLOUD

  17. Comparative study of Internet of Things infrastructure and security

    DEFF Research Database (Denmark)

    Singh, Bhupjit; Kaur, Bipjeet

    With increasing use of IoTs in diverse fields has increased the demands of different parameters for high level of security, trust and applications. Several companies have invested millions of dollar to fulfill the needs of the market which has given rise variant infrastructures of IoTs. In this p...

  18. The Importance of Authorized Economic Operator Institution for the Security of Supply Chain in the International Goods Turnover of Polish Enterprises

    Directory of Open Access Journals (Sweden)

    Miroslawa Laszuk

    2016-01-01

    Full Text Available Together with the growth of international exchange of goods also the number of threats increases that potentially may influence the security of functioning international supply chains. Currently, there is a need of developing solutions which aim at facilitating flow of goods, simultaneously ensuring security against the increasing number of threats related to e.g. terrorist attacks, illegal smuggling, thefts and tax frauds. The article presents institution of an authorized operator – Authorized Economic Operator (AEO, introduced on the territory of the European Union in 2008. The discourse demonstrates influence of functioning AEO certificates on security of international supply chains with the particular attention drawn on the importance of AEO institution for Polish operators.

  19. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in

  20. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  1. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  3. International symposium concluded that uranium supply for nuclear power is secure

    International Nuclear Information System (INIS)

    2000-01-01

    The document informs that stable uranium supply to fuel nuclear power plants will continue to be available according to the conclusion reached at the International Symposium on the Uranium Production Cycle and the Environment held from 2 to 6 October 2000 at the IAEA in Vienna. The meeting included specialists from about 40 countries, in addition to the Arab Atomic Energy Agency, European Commission, OECD/Nuclear Energy Agency (NEA), Office of Supervising Scientist (OSS)/Environment Australia, United Nations, Uranium Institute, World Bank, the World Energy Council and the Nuclear Energy Institute (NEI)

  4. Biosafety, biosecurity and internationally mandated regulatory regimes: compliance mechanisms for education and global health security

    Science.gov (United States)

    Sture, Judi; Whitby, Simon; Perkins, Dana

    2015-01-01

    This paper highlights the biosafety and biosecurity training obligations that three international regulatory regimes place upon states parties. The duty to report upon the existence of such provisions as evidence of compliance is discussed in relation to each regime. We argue that such mechanisms can be regarded as building blocks for the development and delivery of complementary biosafety and biosecurity teaching and training materials. We show that such building blocks represent foundations upon which life and associated scientists – through greater awareness of biosecurity concerns – can better fulfil their responsibilities to guard their work from misuse in the future. PMID:24494580

  5. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Helen H [Los Alamos National Laboratory

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  6. IAEA Contribution to International Peace, Security and Prosperity, 27 July 2011, Matsumoto, Japan

    International Nuclear Information System (INIS)

    Amano, Y.

    2011-01-01

    It is a great honour for me to address this 23rd United Nations Conference on Disarmament Issues. I would like to begin by expressing my deepest sympathy, on behalf of the International Atomic Energy Agency, to the Government and people of Japan on the terrible earthquake and tsunami which devastated the country in March. Our thoughts are with the many thousands of people who lost loved ones or whose homes and livelihoods were destroyed. As you know, this natural disaster of unprecedented severity led to a serious accident at the Fukushima Daiichi nuclear power plant. The IAEA has been working at full stretch since the accident happened on March 11 to assist the plant operator and the Japanese authorities in bringing the situation back under control. Before talking about the Agency's work in nuclear non-proliferation, I would like to update you on recent developments concerning Fukushima Daiichi. The IAEA has served as the international focal point for assistance, information-sharing and follow-up. We have shared authenticated information about the situation at the Fukushima Daiichi plant with Member States and sent specialist technical teams to advise Japan in areas such as radiological monitoring and food safety. Throughout the crisis, we have worked closely with our key partners in the UN system. In fact, this has been a good example of the UN ''one house'' approach at work. I convened an IAEA Ministerial Conference on Nuclear Safety which took place in Vienna last month. It agreed a Ministerial Declaration which I am confident will lead to a significant strengthening of nuclear safety, emergency preparedness and radiation protection of people and the environment throughout the world. I was encouraged by the fact that proposals which I made in five key areas were included in the Ministerial Declaration. These were: To strengthen IAEA Safety Standards; To systematically review the safety of all nuclear power plants, including by expanding the IAEA's programme of

  7. Hacking a Bridge: An Exploratory Study of Compliance-Based Information Security Management in Banking Organization

    Directory of Open Access Journals (Sweden)

    Tesleem Fagade

    2017-10-01

    Full Text Available This work is approached through the lens of compliant security by drawing on the concepts of neutralization theory, a prominent postulation in the criminology domain and the 'big five' personality construct. This research is conducted based on a case study of ISO/IEC27001 Standard certified banks, to empirically evaluate the link between cybersecurity protocols violation and how employees rationalise security behaviour. We propose that compliance-based security has the propensity for a heightened sense of false security and vulnerability perception; by showing that systemic security violation in compliance-based security models can be explained by the level of linkages from the personality construct and the neutralization theory. Building on the survey responses from banking organization employees and the application of partial least square structural equation modelling (PLS-SME analysis to test the hypotheses and validate survey samples, we draw a strong inference to support the importance of individual security scenario effect as a vital complementary element of compliance-based security. Based on our initial findings, conceptual principles and practical guidelines for reducing insider threats and improving employees' compliance is presented. We then suggest how information security protocol violations can be addressed in that context.

  8. A Study of Gaps in Defensive Countermeasures for Web Security

    Science.gov (United States)

    2016-10-14

    report [8], the Web Hack - ing Incident Database (WHID) [39], and the OWASP Top 10 Ranking [28]. The Cenzic report provides some insight into the...to protect or verify the secure use of these interfaces. One recent example [47] looks at the use of single sign-on (e.g., Facebook ) and payment...clicked. For example, Facebook confirms if a user indeed wants to click the “Like” button for sites that it deems suspicious. Description of Deployment

  9. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  10. Information security risk management for computerized health information systems in hospitals: a case study of Iran

    Science.gov (United States)

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    Background In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. Materials and methods This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Results Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Conclusion Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran. PMID:27313481

  11. Information security risk management for computerized health information systems in hospitals: a case study of Iran.

    Science.gov (United States)

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.

  12. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  13. The Study on Progression for Consolidating the Nuclear Security Legislative System

    International Nuclear Information System (INIS)

    Kim, Jae San; Jung, Myung Tak

    2015-01-01

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next

  14. Atmospheric Extremes in a Changing Climate: A Strategy for Improved Understanding Driven by International Security Concerns

    Science.gov (United States)

    Davis, A. B.; Kao, C. J.

    2001-05-01

    The overarching mission of Los Alamos National Laboratory is to use science and technology to reduce nuclear danger. In the complex multipolar reality of the post cold-war era, this core mission is naturally enlarged to include all weapons of mass destruction (nuclear, chemical, and biological) as well as acts of terrorism. Traditionally, LANL and other institutions in the DOE weapons complex pay little attention to the reasons a country or group of individuals chooses the road of proliferation. That is considered a ``soft'' science at best and, at any rate, is left to other government agencies, their non-governmental and their international partners. However, this division-of-labor overlooks an area of challenging science where DOE laboratories such as LANL, in partnership with academia, can offer valuable insight into a sensitive ``trigger'' in the proliferation process. Indeed, a population subjected to catastrophic environmental degradation becomes far more likely to endorse a proliferant regime or spawn terrorist groups simply because it has little more to lose. Once physical health and economic survival is in jeopardy, whole populations and individuals alike become desperate. This situation is more easily exploited politically than remedied through international aid, especially when the region is already volatile. Scenarios of political de-stabilization due to environmental degradation become even more likely when reminded that the planet is gradually warming and, quite possibly, this trend in the mean will drive changes in extreme weather patterns, quite possibly, for the worse in terms of intensity, duration and frequency. Of the long list of natural disasters that threaten populations and infrastructure, most involve the atmosphere, largely because it is the least inert (hence most turbulent) of the geophysical fluids. Furthermore, the dominant nonlinear response in a complex socio-environmental system is generically not to a change in the mean, but to a

  15. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  16. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  17. Energy policy for Europe. Ensuring secure and low-carbon energy in the EU's internal market. Interim report

    International Nuclear Information System (INIS)

    Egenhofer, C.; Hammes, J.J.; Pedersen, K.

    2006-12-01

    mainly on the internal aspects, i.e. what the EU can implement internally, it nevertheless takes into account some of the external dimension of energy, as they are an important backdrop of EU energy policy. This Interim Report concentrates on six key areas that are discussed in sections 2 to 7. The starting point for an EU energy policy framework is to identify the European added value. The new framework needs to be more than just pasting together a number of largely isolated sector-specific policies. Putting together a package of disconnected policies risks a sub-optimal outcome, ignoring interaction between policies (section 2). The report introduces the concept of robustness of EU energy policy. At the heart of robustness is the EU internal energy market. The report makes a number of suggestions to improve robustness both by improving the functioning of the internal energy market and by complementary government action (section 3). To make progress towards a situation where the EU can speak with one voice, this report ponders the possibilities for the EU to assess member state external energy policy actions as to their EU impacts and to create more consistency and coherence between EU and member state policies. Key issues for international energy cooperation and diplomacy will be will be energy efficiency, investment in production and infrastructure, market access and climate change policies (section 4). Achieving both energy security and climate change targets while allowing for long-term competitive energy is likely to require paying a premium. How such a premium can be identified and implemented is discussed in section 5. This leaves the question on the best instrument to deal with security of supply and long-term sustainability and whether market-based or non-market based instruments are the best options (section 6). The concluding section (7) analyses the role of targets and sets out the conditions under which targets can work. It finds that EU targets are useful

  18. Digital Preservation and Copyright: An International Study

    Directory of Open Access Journals (Sweden)

    June M. Besek

    2008-12-01

    Full Text Available The aim of the International Study on the Impact of Copyright Law on Digital Preservation was to review current copyright and related laws and their impact on digital preservation, as well as to make recommendations to help libraries, archives and other preservation institutions sustain digital works. Study partners are based in Australia, the Netherlands, the United Kingdom and the United States. The study found that, in many cases, digital works are not being preserved in a systematic way. This is partly because digital preservation entails more difficult copyright issues than preservation of non-digital material. All the surveyed countries have some form of exception for preservation activities. However, there is inconsistency in the details between the countries’ laws and uncertainty in how they apply in the digital environment. None of the countries surveyed have a uniform national system yet for collecting digital materials. Technological protection measures and licensing arrangements may, in some cases, present significant practical barriers to preservation. Current approaches to address these barriers are ad hoc and include requesting permissions from individual rights holders and some use of model licence terms that permit preservation. Moreover, as yet, there are no effective solutions to the general issue of orphan works. Recommendations of the study include suggestions for drafting national policies and adapting laws to allow digital preservation to be undertaken as necessary, in accordance with international best practice standards, and for promoting national systems for the collection of digital materials by relevant state and national collecting institutions.

  19. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    Science.gov (United States)

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…

  20. Pengaruh Pemasaran Internal dan Kualitas Layanan Internal Terhadap Kepuasan Pelanggan Internal (Studi Pada Industri Kepariwisataan di Daerah Istimewa Yogyakarta

    Directory of Open Access Journals (Sweden)

    Jumadi Jumadi

    2016-06-01

    Full Text Available The aim of this research is to investigate the implication of internal marketing and internal service quality effectivity towards internal customer satisfaction in Tourism Industry in Yogyakarta Special Territory. This internal marketing studyinvolves variables of motivation and reward system, effective communication, effective employee's selection, effective recruitment, effective development, effective support system, and healthy work environment. While the internal quality service aspects that will be examined in this study are: tangible, emphaty, responsiveness, reliability and assurance, and then their influences on internal customer satisfaction would be analyzed.The sample size is 210 respondents,which is determined using purposive sampling method. The main instrument for data collection in this study is through questionnaire. The analysis tool used to examine the hypothesis of the study is Structural Equation Modeling using AMOS Version 20.0 Software. The result of the study shows that: Internal marketing and internal quality service significantly influence internal customers satisfation. However, the internal quality service influence the internal customers satisfaction more significantly. Therefore the managers in tourism industry should improve the internal marketing more than the internal quality service.

  1. Study of International Standards of Risk Management

    Directory of Open Access Journals (Sweden)

    Dykan Volodymyr L.

    2014-01-01

    Full Text Available The goal of the article lies in the study of existing international standards of risk management, an important factor of improvement of risk management in domestic corporations and enterprises and development of recommendations on application of international standards in Ukraine, in particular, within the framework of building corporate systems of risk management. The conducted study shows that approaches on organisation of the process of risk management, used in standards of risk management, are of general character and differ with the degree of detailing. Their undoubted value in development of risk management in Ukraine is identification of a general direction of building corporate systems of risk management in practice. The said approaches at the national and corporate levels of standardisation in Ukraine within the framework of building corporate systems of risk management would allow improvement of risk management in corporations and enterprises. The prospect of further studies of domestic specialists in the field of risk management is development of the domestic standard of risk management with consideration of modern domestic specific features of development of risk management in Ukraine and leading foreign experience.

  2. CONFIGURING THE ROLE OF THE UNITED NATIONS SECRETARYGENERAL IN THE PEACEFUL SETTLEMENT OF INTERNATIONAL DISPUTES. RELATIONS WITH THE SECURITY COUNCIL AND THE GENERAL ASSEMBLY

    Directory of Open Access Journals (Sweden)

    OANA-ADRIANA IACOB

    2012-05-01

    Full Text Available In an international context embracing the idealist concepts of harmony, cooperation, structural peace, illegality of war, the United Nations Organization has created a system of peaceful settlement of disputes, based on principles of justice and international law. In this framework, the organs bearing the responsibility of peaceful resolution of conflicts are the International Court of Justice, the Security Council, the General Assembly and the Secretary-General. The latter has a unique position, triggering a spectacular evolution of its role in the maintenance of international peace and security. The challenges of the international environment and the outstanding ways in which they were addressed by the distinctive personalities that filled the function of the Secretary General, creating precedents and influencing its future development, have led to a continuous enlargement of its role. The purpose of the present paper is that of defining the role of the Secretary-General in the system of peaceful settlement of international disputes created by the United Nations, by analysing the relevant provisions consecrated in the Charter and by revealing and explaining the outstanding evolution of this institution, with an emphasis on the relations of mutual influence between the High Official, on one side, the Security Council and the General Assembly, on the other.

  3. International Students' Emotional Security and Dignity in an Australian Context: An Aspect of Psychological Well-Being

    Science.gov (United States)

    Tananuraksakul, Noparat; Hall, David

    2011-01-01

    This article explores non-native English-speaking students' emotional security and dignity responses to their English language proficiency in an Australian context. Confidence is a source of emotional security bolstering dignity. Without it, students lack emotional security, diminishing their dignity when communicating with culturally different…

  4. The CSN hosts the Second International Conference on Nuclear Security in Madrid; El CSN acoge en Madrid la Segunda Conferencia Internacional de Seguridad Fisica Nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Scialdone Garcia, A.

    2016-08-01

    The second International Conference on Nuclear Security was held in Madrid between May 9th and 13th last. The acting Minister of the Interior announced that the number of officers of the Guardia Civil watching over the Spanish nuclear power plants will be doubled. (Author)

  5. Safety and security in acute admission psychiatric wards in Ireland and London: a comparative study.

    Science.gov (United States)

    Cowman, Seamus; Bowers, Len

    2009-05-01

    The comparative element of this study is to describe safety and security measures in psychiatric acute admission wards in the Republic of Ireland and London; to describe differences and similarities in terms of safety and security patterns in the Republic of Ireland and London; and to make recommendations on safety and security to mental health services management and psychiatric nurses. Violence is a serious problem in psychiatric services and staff experience significant psychological reactions to being assaulted. Health and Safety Authorities in the UK and Ireland have expressed concern about violence and assault in healthcare, however, there remains a lack of clarity on matters of procedure and policy pertaining to safety and security in psychiatric hospitals. A descriptive survey research design was employed. Questionnaires were circulated to all acute wards in London and in Ireland and the resulting data compared. A total of 124 psychiatric wards from London and 43 wards from Ireland were included in this study and response rates of 70% (London) and 86% (Ireland) were obtained. Differences and similarities in safety and security practices were identified between London and Ireland, with Irish wards having generally higher and more intensive levels of security. There is a lack of coherent policy and procedure in safety and security measures across psychiatric acute admission wards in the Republic of Ireland and London. Given the trends in European Union (EU) regulation, there is a strong argument for the publication of acceptable minimum guidelines for safety and security in mental health services across the EU. There must be a concerted effort to ensure that all policy and procedure in safety and security is founded on evidence and best practice. Mental health managers must establish a review of work safety and security procedures and practices. Risk assessment and environmental audits of all mental health clinical environments should be mandatory.

  6. A SITUAÇÃO DO ESTRANGEIRO NO BRASIL FACE AOS ACORDOS INTERNACIONAIS DE PREVIDÊNCIA SOCIAL FIRMADOS PELO ESTADO BRASILEIRO / THE FOREIGN SITUATION IN BRAZIL FACE THE INTERNATIONAL SOCIAL SECURITY AGREEMENTS SIGNED BY THE BRAZILIAN STATE

    Directory of Open Access Journals (Sweden)

    Lycia Cibely Porto Jales

    2017-04-01

    Full Text Available With the increasing number of economic cooperation agreements, people began to gain more mobility to pursue their jobs in foreign countries. In consequence to this migratory movement, problematics have emerged. They concern to the social security schemes to be applied to workers who are susceptible to different pension laws for being working in different countries of their origin. As a result, governments started to sign International Agreements on Social Security matter in order to ensure the rights provided in the social security laws of the countries that take part in the treaty, so that the “workers of the world” begin to have their pension rights guaranteed. Through a theoretical normative study, specifically from a bibliographic and existing legislation in the related subject, the object of this study is to verify the foreign worker situation in the State of Brazil, analyzing international agreements in social security matter agreed between Brazil and other countries in bilateral and multilateral level. It also aims at verifying the benefits safeguarded obligations, legal effects and means of conflicts resolution.

  7. The EU’s Cybercrime and Cyber-Security Rule-Making: Mapping the Internal and External Dimensions of EU Security

    NARCIS (Netherlands)

    Fahey, E.

    2014-01-01

    EU Security impacts significantly upon individuals and generates many questions of the rule of law, legal certainty and fundamental rights. These are not always central concerns for EU risk regulation, especially given that EU risk regulation has sought to draw close correlations between EU risk and

  8. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    Directory of Open Access Journals (Sweden)

    O'Neill Conor

    2011-03-01

    Full Text Available Abstract Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246 were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100. Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95 and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943. For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930; low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949. Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement

  9. Information security risk management for computerized health information systems in hospitals: a case study of Iran

    Directory of Open Access Journals (Sweden)

    Zarei J

    2016-05-01

    Full Text Available Javad Zarei,1 Farahnaz Sadoughi2 1Health Information Management, Health Management and Economics Research Center, School of Health Management and Information Science, Iran University of Medical Sciences, Tehran, Islamic Republic of Iran, 2Health Information Management Department, School of Health Management and Information Science, Iran University of Medical Sciences, Tehran, Islamic Republic of Iran Background: In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs, which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran.Materials and methods: This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health.Results: Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals.Conclusion: Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security

  10. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  11. Responding to the challenges of water security: the Eighth Phase of the International Hydrological Programme, 2014–2021

    Directory of Open Access Journals (Sweden)

    B. Jimenez-Cisneros

    2015-04-01

    Full Text Available This paper presents the major water challenges at global, regional and local levels, including the need to adapt to climate change. It relates how the International Hydrological Programme (IHP – an intergovernmental scientific programme – will respond in its Eighth Phase to the water-related risks and seize potential opportunities, thereby contributing to ensure Water Security at all levels. The Member States of UNESCO IHP periodically define priorities for research, technological development, innovation and education. To implement the priorities in a coordinated manner, the Member States can count on the team and the projects of IHP based at UNESCO, as well as on the "UNESCO Water Family|, consisting to date of a Category 1 centre UNESCO-IHE located in the Netherlands; the World Water Assessment Programme, based in Italy, which produces the World Water Development Report of the United Nations; 30 Category 2 water centres under the auspices of UNESCO; and 35 water chairs in various parts of the world. Governments can access the powerful network of the UNESCO Water Family through IHP and its Intergovernmental Council.

  12. Analysis of Maize versus Ethanol Production in Nebraska, United States and International Agricultural Droughts: Lessons for Global Food Security

    Science.gov (United States)

    Boken, V.; Tenkorang, F.

    2012-04-01

    Nebraska is one of the eight main corn (maize) belt states of the United States. Maize is the major crop of Nebraska with an average annual production of about 38 million tons (about 12% of U.S. production), which contributes billions of dollars to the state's economy. The yield of maize has increased significantly over the past century - from 1.6 t/ha in 1900 to 10.4 t/ha in 2010. While the majority of maize (about 40%) is currently used for animal feed and ethanol production, only about six percent is exported. It is estimated that about one billion people accounting for about 15% population of the world live in chronic hunger because of low agricultural productivity and drought. Most of these people depend on the U.S. for grains including maize. If a greater quantity of maize is diverted to ethanol production, considerably less quantity of maize would be available for export to developing countries where it could be used for human consumption and to mitigate hunger and improve food security. This paper presents analysis of maize production in Nebraska for the past three decades and examines how its commercialization for ethanol production has affected its exports in the face of drought at an international level.

  13. Regional cooperation for transport of nuclear and radioactive material. Safety, security and safeguards related regulatory tasks concerning international spent fuel shipments

    International Nuclear Information System (INIS)

    Koblinger, László; Horváth, Kristóf

    2016-01-01

    The safety, security and safeguards related regulatory tasks of international spent fuel transports are to be performed according to international conventions; additionally, Hungary as a member state of the European Union shall comply with the relevant EURATOM requirements. The international requirements are reflected in the national legislations of the countries concerned by the transports of research reactor spent fuel under the Global Threat Reduction Initiative repatriation project. The successful realization of these shipments demanded long-lasting preparation with thorough cooperation and conduct with clockwork precision by the regulatory bodies within states and regionally

  14. Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study

    DEFF Research Database (Denmark)

    Handler, Daniel Tolboe; Hauge, Lotte; Spognardi, Angelo

    2017-01-01

    Security and privacy issues are rarely taken into account in automated systems for monitoring elderly people in their home, exposing inhabitants to a number of threats they are usually not aware of. As a case study to expose the major vulnerabilities these systems are exposed to, this paper reviews...... a generic example of automated healthcare monitoring system. The security and privacy issues identified in this case study can be easily generalised and regarded as alarm bells for all the pervasive healthcare professionals....

  15. Gastroschisis and associated defects: an international study.

    LENUS (Irish Health Repository)

    Mastroiacovo, Pierpaolo

    2007-04-01

    Our objective was to evaluate the frequency and type of malformations associated with gastroschisis in a large pool of international data, to identify malformation patterns, and to evaluate the role of maternal age in non-isolated cases. Case-by-case information from 24 registries, all members of the International Clearinghouse for Birth Defects Surveillance and Research (ICBDSR), were evaluated. After the exclusion of other abdominal wall defects cases were classified as: (a) isolated; (b) recognizable syndrome, chromosomal or not; (c) multiple congenital anomalies (MCA). Our results showed that out of 3,322 total cases 469 non-isolated cases were registered (14.1%): 41 chromosomal syndromes, 24 other syndromes, and 404 MCA. Among MCA four groups of anomalies were most frequent: CNS (4.5%), cardio-vascular (2.5%), limb (2.2%), and kidney anomalies (1.9%). No similar patterns emerged except two patterns resembling limb-body wall complex and OEIS. In both of them the gastroschisis could be however misclassified. Chromosomal trisomies and possibly non-syndromic MCA are associated with an older maternal age more than isolated cases. On consideration of our data and the most valid studies published in the literature, the best estimate of the proportion of gastroschisis associated with major unrelated defects is about 10%, with a few cases associated to recognizable syndromes. Recognized syndromes with gastroschisis seem to be so exceptional that the well documented and validated cases are worth being published as interesting case report. An appropriate case definition in etiological studies should include only isolated gastroschisis after an appropriate definition of isolated and non-isolated cases and a thorough case-by-case review.

  16. Nuclear power in Northern Russia: A case study on future energy security in the Murmansk region

    Energy Technology Data Exchange (ETDEWEB)

    Kinnunen, Miia [Haemeenkatu 7 D, 33100 Tampere (Finland)]. E-mail: miia.kinnunen@tse.fi; Korppoo, Anna [Haemeenkatu 7 D, 33100 Tampere (Finland); Imperial College London, Centre for Environmental Policy, RSM Building, Prince Consort Road, London SW7 2BP (United Kingdom)

    2007-05-15

    The economy of the Murmansk region in Russia is based on energy intensive industry, mainly metallurgies, and consequently, the region is highly dependant on the ageing Kola nuclear power plant. This interdependence together with other weaknesses in the regional energy system creates threats to the energy supply security of the region. This paper analyses the internal and external threats influencing the region and presents potential solutions. Scenarios further illustrate possible future paths these potential solutions could deliver by the year 2025.

  17. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark

  18. An analysis of Indonesia’s information security index: a case study in a public university

    Science.gov (United States)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  19. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  20. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    Science.gov (United States)

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.