WorldWideScience

Sample records for international security studies

  1. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  2. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. Anachronistic Research in International Relations and Security Studies

    NARCIS (Netherlands)

    de Wilde, J.H.; Jacob, Edwin Daniel

    2017-01-01

    Anachronisms are widely used in the social sciences and humanities, yet hardly studied. The construction of historical narratives is problematic due to the projection of contemporary thinking. Even more problematic is the use of historical analogies for future planning. Projection of nineteenth

  4. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  5. The Social and Economic Security of International Students: A New Zealand Study

    Science.gov (United States)

    Sawir, Erlenawati; Marginson, Simon; Nyland, Chris; Ramia, Gaby; Rawlings-Sanaei, Felicity

    2009-01-01

    International education has generated complex problems of governance. As well as being beneficiaries of educational services and consumers of a product, international students are also migrants, workers and beings with civil rights. Arguably, the regulation of international student security as consumer protection fails to recognize this full range…

  6. The Social and Economic Security of International Students: A New Zealand Study

    Science.gov (United States)

    Sawir, Erlenawati; Marginson, Simon; Nyland, Chris; Ramia, Gaby; Rawlings-Sanaei, Felicity

    2009-01-01

    International education has generated complex problems of governance. As well as being beneficiaries of educational services and consumers of a product, international students are also migrants, workers and beings with civil rights. Arguably, the regulation of international student security as consumer protection fails to recognize this full range…

  7. Study Regarding the Provision of Security and Safety in the International Maritime Transport

    Directory of Open Access Journals (Sweden)

    Liliana POPA

    2011-11-01

    Full Text Available The security in transport has become a crucial issue internationally, especially after the terrorist attacks of September 2001 and even more recently. Maritime, along with aviation, is considered a sensitive and of high-risk transport sector, in terms of security. Moreover, topics related to safety in maritime transport have become very important over the past decades mostly because of the numerous maritime accidents putting in danger both human lives and the environment. Taking into account the global dimension of maritime transport along with the fact that the participation of Asia in the world trade during the past decade has been substantial, the current maritime safety and security practices apply for all areas. This can only be achieved through the application of high standards and regulations setting the prerequisites for safe and secure navigation. In this direction, a significant number of Directives, Regulations and Initiatives on maritime safety and security have been introduced by international and European organizations, such as the International Maritime Organization, (I.M.O., the International Labour Organization (I.L.O. and the European Union (EU. In the framework of this analysis, the levels of compliance of European and Asian countries, regarding the international legislation, is examined while special emphasis is given on the problems and difficulties encountered during the implementation processes. Furthermore, a number of recommendations aiming to enhance the existing levels of safety and security in maritime transport in both examined area is provided.

  8. The EU as an international security provider

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen; Wolff, Stefan; Whitman, Richard

    2015-01-01

    This contribution develops a framework of analysis that covers the actors involved in the policy making process of international security provision, the dynamics of this process itself, its outcomes (concrete strategies and policies) and their impact. Our efforts to establish such a framework...... of analysis, which could serve as the foundation for a mid-range theory of the EU as an international security provider, will examine the relevance of, and apply, existing theories of international relations/international security and foreign policy analysis to the specific case of the EU. The framework...... that will emerge from this analysis will then be tested and applied empirically in the following contributions that focus on how particular policies are formulated and implemented, and that analyse, in single and comparative case studies, the impact and effectiveness of the EU as an international security provider....

  9. Global climate change and international security

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  10. Segurança internacional e normatividade: é o liberalismo o elo perdido dos critical securities studies? International security and normativity: is liberalism the critial securities studies' lost link?

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2008-01-01

    Full Text Available O surgimento, e afirmação, de uma corrente de estudos críticos em segurança internacional plantou firmemente a idéia de que os problemas de segurança internacional não estão meramente relacionados com aspectos objetivos que ameaçam os Estados, mas esses problemas estão relacionados estreitamente com as relações entre indivíduo e emancipação humana. Assim, a condição de segurança em sentido forte tem, como precondição, a emancipação humana. Porém, em que condições esse overlap entre segurança internacional e emancipação acontece? A tese deste artigo é problematizar essas condições, que escapam ao diálogo endógeno dos critical securities studies (CSS. E que uma pista para operacionalização pode ser procurada nos diálogos entre a teoria crítica cosmopolita e a teoria liberal cosmopolita. Essa interseção, ou continuum, aponta a tese do artigo, é possível se os CSS atentam para dimensões do liberalismo político que têm sido negligenciadas, especialmente a democracia pensada em bases transnacionais e as possibilidades da sociedade civil transnacionalizada.The appearance and consolidation of a critical studies approach on international security fortified the claim that international security problems are not merely related to objective threats to states, but are in deep connection with the relationship between the individual and human emancipation. In those terms, a solid security condition is primarily preconditioned by human emancipation. However, in what conditions do international security and emancipation overlap? The present article intends to explore the question, a topic that is not tackled by the endogenous debate of critical security studies (CSS. An interesting path to be followed seems to be the dialogue between cosmopolitan critical theory and cosmopolitan liberal theory. This article argues that an intersection, or continuum, of these two theories would be possible if CSS focused on dimensions

  11. The impact of potential political security level on international tourism

    Science.gov (United States)

    Young-Rae Kim; Chang Huh; Seung Hyun Kim

    2002-01-01

    The purpose of this study was to investigate the impact of potential political security in an effort to fill in two foregoing research gaps in international tourism. To investigate the relationship between political security and international tourism, a simple regression model was employed. Secondary data were collected from a variety of sources, such as international...

  12. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  13. International Energy Security Indicators and Turkey’s Energy Security Risk Score

    OpenAIRE

    2014-01-01

    Energy security has been a priority for many countries. What makes energy security that important is; its bilateral relationship with economic, political, social, environmental sustainability and military issues. As an inevitable consequence of globalization cooperation in the field has been a must and it is required international energy security indicators to make energy security risk evaluations in order to establish adequate policies. The aim of the study is to review energy security withi...

  14. Strategy to Enhance International Supply Chain Security

    Science.gov (United States)

    2007-07-01

    a strategic plan to enhance the security of the international supply chain , including protocols for the expeditious resumption of the flow of trade...following a transportation disruption or transportation security incident. The Strategy to Enhance International Supply Chain Security exists within a...extensive risk analysis specific to the risk area they cover in the supply chain . Assessments are used to identify the highest risk areas and resources

  15. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  16. Global climate change and international security.

    Energy Technology Data Exchange (ETDEWEB)

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  17. International Security in the World Economic Relations

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P

    2016-05-01

    Full Text Available The article discusses the urgent topic of the evolution of international relations, the issue of establishing international security, and the development of international economic cooperation based on the principles of security. In order to analyze the current status of international security in the world and to identify key factors that hinder the way of establishing a positive global community, researches by the international analytical centers together with the institutes for international security and cooperation have been generalized. To this end, both the status of and changes in the Global Peace Index in the recent years has been disclosed, the position of Ukraine in the world according to this index has been examined. It has been proven that the main international security problems are related to the armed conflicts, civil wars, political violence, terrorism impacting the development of humanity as a whole, the status of international relations, the evolution of the world economy as well as national economies. Further researches should be focused on how the status of peace in the countries impacts their economic status and the status of international cooperation in other areas of economic cooperation, excluding the military. It should be answered particularly, how the above indicated status affects strengthening the Ukraine's position in the world.

  18. 78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice

    Science.gov (United States)

    2013-08-20

    ...-military affairs, international security and related aspects of public diplomacy. The agenda for this... issues regarding arms control, international security, nuclear proliferation, and diplomacy. For more...

  19. International security experience in tourism

    Directory of Open Access Journals (Sweden)

    Alexander А. Ryabtsev

    2010-10-01

    Full Text Available The article dwells upon the international experience of the provision of safety in tourism. The problem of safe tourist activities is complex and many – sided, as for tourism to develop and function the safety of travelers, holidaymakers and their personal property is extremely important.

  20. Problematising internal security: Crime, community and social exclusion

    Directory of Open Access Journals (Sweden)

    Kari Bruun

    2016-12-01

    Full Text Available This article examines the problematisation of crime, crime prevention and security in contemporary security policy programmes using three Finnish internal security programmes and theory-based content analysis. The study is based on the theory (the perspective of an analytics of government. The findings highlight the central meaning of social exclusion and community as security practices wherein social exclusion is seen as a threat to security and a risk for crime. Indeed, community-based crime prevention plays a central role in the programmes along with the worry about serious crimes and the high level of homicides. A fluid governing policy without crime and accidents is the implicit goal of these programmes.

  1. TRANSNATIONAL ORGANIZED CRIME. AN (INTERNATIONAL SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ionel Stoica

    2016-10-01

    Full Text Available For the past two decades organized crime has become a transnational phenomenon, and its impact is still far from being fully known and understood by common people. Its forms of manifestation, whether explicit, or subtle, are permanently evolving and adapting. As a result, its interference with the activities from the legal area makes it difficult to identify and counteract. After a long period of time when it was more a peripheral phenomenon, current transnational organized crime tends to become a major danger to the political, social and economic stability of the states. Through its nature and goals, as well as through the complexity of its forms of manifestation, transnational organized crime represents a major challenge for the state and nonstate organizations that deal with national and international security This paper focuses on the phenomenon starting from some of the most influent theories in international relations, presents the current features of transnational organized criminal groups and analyzes the causes and the favoring factors of the phenomenon, as well as the impact of the phenomenon upon national and international security at political, economic-financial and military level. The approach is an interdisciplinary one and also covers the nexus between transnational organized crime and international terrorism.

  2. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  3. The Contribution of University Accommodation to International Student Security

    Science.gov (United States)

    Paltridge, Toby; Mayson, Susan; Schapper, Jan

    2010-01-01

    In this paper we argue that living in university accommodation is a possible means of improving the security of international students. Our argument is supported by a qualitative case study of a single Hall of Residence on Monash University's Clayton campus. Data were collected primarily from interviews with three groups of participants--six…

  4. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  5. Current International Cooperation and Developments in Information Security

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Global information security and the threats to its integrity are becoming increasingly important. In this paper,the authors talk about areas requiring international cooperation, the major problems with current international cooperation, and finally give their reflections on international cooperation.

  6. The role of the media in establishing international security regimes

    Directory of Open Access Journals (Sweden)

    Chanan Naveh

    2005-04-01

    Full Text Available This article focuses primarily on the media's impact on international security regimes. It explores the ways in which the media affect the lifecycles of international regimes, from the time they are first conceived of, through their establishment, consolidation and stabilization, up until their ultimate demise. Although this paper highlights the media's role in the evolution of security regimes, it is clear that, regardless of the regime in question, media play a role throughout the lifecycle of all international regimes, whatever their character. In order to analyze the relationships of the media with security regimes in general, and specifically their contribution to each stage in their development, the article utilizes methodologies from the field of communication studies. It examines the media's agenda, "news values" and various functions, and their ability to mobilize public support for the particular issue of the regime. To date, most studies have explored the interaction between media communication patterns and global developments at the state level, or in relation to the formulation of foreign policy, while largely ignoring the international dimension of the relationship. This article attempts to remedy this situation, and the relevant processes are analysed in a case study of the anti-Iraq international security regime. It should be noted that although the paper focuses on the specific anti-Iraqi regime, it is part of a more general Anti-Rogue actors regime which includes the war against global terrorism. The study of the development of the anti-Iraq press-security regime teaches us that during international crises the media mobilize and unanimously support the regime fighting the "bad guys." But, when the regime develops and enters disputed turfs and begins to lose its legitimacy, media support diminishes, and the media may even develop into an opposing force and may join the actors fighting against this regime. Moreover, the study of

  7. Internal Challenges of Ukrainian Security Process

    Science.gov (United States)

    2014-12-12

    proposes to study aspects that may influence security system adaptation, such as corruption, bureaucracy , decentralization of power, and Clausewitz’s...adaptation, such as corruption, bureaucracy , decentralization of power, and Clausewitz’s triad relationship between the military and people. iv...issue that could have alerted Ukrainian leadership was the Tuzla Crisis in October of 2003. At the end of September 2003, the Russian Federation began

  8. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  9. Common Operating Picture: UAV Security Study

    Science.gov (United States)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  10. IMPORTANCE OF SECONDARY MARKET INTERNATIONAL FOREIGN DEBT SECURITIES: THEIR CONTRIBUTION TO INTERNATIONAL FINANCE

    OpenAIRE

    Villamonte Blas, Ricardo Norberto; Facultad de Ciencias Contables, Universidad Nacional Mayor de San Marcos

    2014-01-01

    The best contribution academically can provide financial events that contributed to the development of international finance is to study them in depth so that their treatments and outcomes allow experts and stakeholders to have a better understanding of its evolution , characteristics and importance . The International Securities Secondary Market of External Debt (MSDE) is typified as a very unique market, defining it as a bilateral trading market with special features, which has had a crucia...

  11. Human Insecurity: Understanding International Migration from A Human Security Perspective

    Directory of Open Access Journals (Sweden)

    Francesca Vietti

    2013-07-01

    Full Text Available This article examines contemporary, mass migration from the perspective of human security. It tracks the development of the human security model of international relations, and compares it to the well-established state security model that has served as the dominant paradigm for international relations since the seventeenth century. The article argues that human security offers a more effective approach to many of the underlying problems and threats associated with mass migration, than does the traditional state-security model.  It challenges national and international authorities to address threats to human security, in order to minimize forced migration and to create the conditions for migration by choice, not necessity.

  12. The Impact of Regional Higher Education Spaces on the Security of International Students

    Science.gov (United States)

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  13. The Impact of Regional Higher Education Spaces on the Security of International Students

    Science.gov (United States)

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  14. Human rights and internal security in Malaysia rhetoric and reality

    OpenAIRE

    Rahim, Noor Hishmuddian

    2006-01-01

    Since 1957, Malaysia has faced external and internal security threats. Over time, Malaysia has succeeded in solving the external threats but internal threats remained. The internal threats have come in many forms, including ethnic conflict, religious extremism and deviationism, and terrorism. Since the safety of the public lies in the hands of the government, measures have been taken to ensure the nation's stability and security, including restriction on civil and political liberties. This th...

  15. 75 FR 3950 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2010-01-25

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed..., the International Securities Exchange, LLC (``ISE'' or ``Exchange'') filed with the Securities...

  16. 77 FR 4852 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2012-01-31

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed... International Securities Exchange, LLC (the ``Exchange'' or ``ISE'') filed with the Securities and...

  17. 76 FR 59472 - Self-Regulatory Organizations; International Securities Exchange, Inc., Order Granting Approval...

    Science.gov (United States)

    2011-09-26

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, Inc., Order Granting Approval of... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and...

  18. The Concept of Security in International Relations Theory

    Directory of Open Access Journals (Sweden)

    Gabriel Orozco

    2006-01-01

    Full Text Available The end of the Cold War and the emergence of globalisation have transformed the reality of International Relations, which has meant a change in the theories which this reality had assumed. The concept of security reveals itself as an organisational idea on the different phenomena of globalisation, carrying out a programme of research that goes beyond the realistic presumptions of military power or of the idealistic principles of research for peace. This article explores the new meanings of security for International Relations theory and discusses the theoretical models that influence policy design and that aim to confront the problems and challenges of security in globalisation.

  19. Security Assistance and International Logistics: Security Assistance Teams

    Science.gov (United States)

    2007-11-02

    o f IMSs in the United States or overseas by military or civilian personnel of the USG and contract technicians or instruction through in- f o r m a...democracies, promoting peace, and recognize human rights and are available to both military and civilian IMSs . International military student A n a t i o...away from home station) to train IMSs in the oper- a t i o n , m a i n t e n a n c e , a n d e m p l o y m e n t o f weapon systems and support

  20. Security studies and Antonio Gramsci’s Prison Notebooks

    OpenAIRE

    Dominik Smyrgała

    2014-01-01

    The article argues that although Antonio Gramsci did not define a new field of research that we could call security studies, his views and ideas on international rela-tions presented in the Prison Notebooks focused around security issues. It may be even stated that his writings anticipated to some extent the birth of security studies after the Second World War – or even the modern theorizing on economic and cultural security.

  1. Security studies and Antonio Gramsci’s Prison Notebooks

    Directory of Open Access Journals (Sweden)

    Dominik Smyrgała

    2014-12-01

    Full Text Available The article argues that although Antonio Gramsci did not define a new field of research that we could call security studies, his views and ideas on international rela-tions presented in the Prison Notebooks focused around security issues. It may be even stated that his writings anticipated to some extent the birth of security studies after the Second World War – or even the modern theorizing on economic and cultural security.

  2. Kindergarten children’s attachment security, inhibitory control, and the internalization of rules of conduct

    Directory of Open Access Journals (Sweden)

    Tobias eHeikamp

    2013-03-01

    Full Text Available Starting from research on relations between attachment and the development of self-regulation, the present study aimed to investigate research questions on relations among inhibitory control, internalization of rules of conduct (i.e., behavior regulation, concern occasioned by others transgressions, confession, reparation after wrongdoing, and attachment security. Attachment security and internalization of rules of conduct of German kindergarten children (N = 82 were assessed by maternal reports. Children’s inhibitory control was measured with the Stop-task. Regression analyses revealed that inhibitory control was positively related to attachment security and to internalization of rules of conduct. Mediational analysis using a bootstrapping approach indicated an indirect effect of attachment security on internalization processes via inhibitory control. Implications for further research on the development of inhibitory control and internalization of rules of conduct are discussed.

  3. Discrimination, Internalized Homonegativity, and Attitudes Toward Children of Same-Sex Parents: Can Secure Attachment Buffer Against Stigma Internalization?

    Science.gov (United States)

    Trub, Leora; Quinlan, Ella; Starks, Tyrel J; Rosenthal, Lisa

    2017-09-01

    With increasing numbers of same-sex couples raising children in the United States, discriminatory attitudes toward children of same-sex parents (ACSSP) are of increasing concern. As with other forms of stigma and discrimination, lesbian, gay, and bisexual (LGB) individuals are at risk for internalizing these societal attitudes, which can negatively affect parenting-related decisions and behaviors and the mental and physical health of their children. Secure attachment is characterized by positive views of the self as loveable and worthy of care that are understood to develop in early relationships with caregivers. Secure attachment has been associated with positive mental and physical health, including among LGB individuals and couples. This study aimed to test the potential buffering role of secure attachment against stigma internalization by examining associations among secure attachment, discrimination, internalized homonegativity (IH), and ACSSP in an online survey study of 209 U.S. adults in same-sex relationships. Bootstrap analyses supported our hypothesized moderated mediation model, with secure attachment being a buffer. Greater discrimination was indirectly associated with more negative ACSSP through greater IH for individuals with mean or lower levels, but not for individuals with higher than average levels of secure attachment, specifically because among those with higher levels of secure attachment, discrimination was not associated with IH. These findings build on and extend past research, with important implications for future research and clinical work with LGB individuals, same-sex couples, and their families, including potential implementation of interventions targeting attachment security. © 2016 Family Process Institute.

  4. Choices in International Conflict: With a Focus on Security Issues in Asia.

    Science.gov (United States)

    Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James

    Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…

  5. Choices in International Conflict: With a Focus on Security Issues in Asia.

    Science.gov (United States)

    Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James

    Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…

  6. A Study on the Control Measures of Information Security in Internal Audit%内部审计信息安全控制措施初探

    Institute of Scientific and Technical Information of China (English)

    赵雅欣

    2011-01-01

    随着内部审计信息化程度的不断提升,有效控制内部审计信息的安全越来越引起人们的重视。本文通过对审计信息安全的四大风险进行深入分析,提出控制审计信息安全风险的五大具体措施,以保证企业信息安全,避免企业利益受损,有效规避内部审计人员职业风险。%With the increasing degree of informatization in internal audit,the effective control of its information security is paid more attention to.By analyzing the four main risks of the security of the audit information,this essay presents five relevant control measures to ensure the information security of the enterprise,avoid losses in the profits of the enterprise,and effectively evade professional risks of the internal audit personnel.

  7. Bourdieu, International Relations and European Security

    DEFF Research Database (Denmark)

    Berling, Trine Villumsen

    2012-01-01

    Despite promising attempts to apply the sociology of Pierre Bourdieu to International Relations (IR), the field could still profit from unexplored potential in his thinking for understanding pivotal theoretical and empirical puzzles. This article takes the failure to fully grasp the paradigmatic...

  8. CENTER FOR CYBER SECURITY STUDIES

    Data.gov (United States)

    Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...

  9. SETT facility of International Nuclear Security Academy

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Hyung Min [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2012-05-15

    After the Cold War was put to an end, the international community, especially the Western world, was concerned about Soviet nuclear materials falling into wrong hands, especially of terrorists. Later, the growing threat posed by terrorist networks such as the Taliban and al Qaeda led to a global campaign to deny such networks materials which may be used for the development of Weapons of Mass Destruction (WMD). The 9 11 attacks made a section of the international community highly apprehensive of WMD terrorism, especially its nuclear version. From this point of view, it is clear that nuclear facilities which contain nuclear materials are very attractive targets for those who have intention of nuclear terror

  10. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    OpenAIRE

    Nguyen THI THUY HANG

    2012-01-01

    Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has change...

  11. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  12. Evaluating the Level of Internal Control System in the Management of Financial Security of Bank

    Directory of Open Access Journals (Sweden)

    Pidvysotska Lyudmyla J.

    2017-06-01

    Full Text Available The article is aimed at studying the organization and technology of evaluation process of the internal control system of bank in order to ensure financial security management of its activities. The work of the internal audit service on monitoring and evaluating the performance of the bank’s internal control system was analyzed. It has been found that improving the level of financial security of commercial banks is conditional upon improvements in the quality of audits and the provision of sound and objective conclusions. The interrelation of the tasks of internal audit service and the tasks of bank’s financial security management has been determined. Methodological recommendations on evaluation of the bank’s internal control system on the basis of results of audit have been proposed.

  13. 78 FR 66984 - International Security Advisory Board (ISAB); Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-11-07

    ..., nonproliferation, political- military affairs, international security, and related aspects of public diplomacy. The..., energy security, and diplomacy. For more information, contact Richard W. Hartman II, Executive Director...

  14. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    postdoctoral fellowships at the Olin Institute for Strategic Studies at Harvard University and the Center for International Security and Cooperation...government and business have frequently invited him to speak on Middle Eastern affairs. JEANNE GUILLEMIN’s training in sociology and anthropology led to her...been the recipient of several scholarships and awards, including two NATO Fellowships and two Fulbright Scholarships. In 1995, he was named to the

  15. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  16. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  17. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  18. 76 FR 81005 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-12-27

    ... all aspects of arms control, disarmament, political-military affairs, international security and related aspects of public diplomacy. The agenda for this meeting will include classified discussions..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman...

  19. International Relations and HRD Activities of the International Nuclear Nonproliferation and Security Academy of the ROK

    Directory of Open Access Journals (Sweden)

    Kwan Kyoo Choe

    2015-07-01

    Full Text Available The objective of this article is to explain the HRD activities on nuclear nonproliferation and security area of the International Nuclear Nonproliferation and Security Academy (INSA of the Korea Institute of Nuclear Nonproliferation and Control (KINAC. The HRD activities on nuclear security in international society have moved gradually from military dimension to the aspect of social management of conflict and threat. The paper would be developed in the following ways; First, the main concept of nuclear security in the Republic of Korea(ROK will be touched, which could show us why and how the ROK has put its step forward into the HRD efforts. Second, the background in conjunction with international relations and its developing process how the Korea Center of Excellence (COE, named as INSA, had been set would be described. Third, the detailed efforts of the ROK to build a COE in Korea in connection with the 2nd Nuclear Security Summit (NSS will be touched with a detailed explanation on its main activities, direction and the perspective. Finally, the aspect of nuclear culture issues and lessons learned in the first year of the nuclear nonproliferation and security HRD activities of the INSA would be developed.

  20. 76 FR 27677 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-05-12

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change by International Securities Exchange to Amend ISE Rule 2102 May 6, 2011. Pursuant to...\\ notice is hereby given that on May 5, 2011, the International Securities Exchange, LLC (the...

  1. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part o

  2. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    OpenAIRE

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period of political renewal and reform in the governance of global food security. The Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part of this reform. Through the CFS reform process, civil society organizations secured the right to co-ordinate autonomously their engagement in the Committee as official participants and are doing so through ...

  3. Global health security and the International Health Regulations

    Directory of Open Access Journals (Sweden)

    Oliva Otavio

    2010-12-01

    Full Text Available Abstract Global nuclear proliferation, bioterrorism, and emerging infections have challenged national capacities to achieve and maintain global security. Over the last century, emerging infectious disease threats resulted in the development of the preliminary versions of the International Health Regulations (IHR of the World Health Organization (WHO. The current HR(2005 contain major differences compared to earlier versions, including: substantial shifts from containment at the border to containment at the source of the event; shifts from a rather small disease list (smallpox, plague, cholera, and yellow fever required to be reported, to all public health threats; and shifts from preset measures to tailored responses with more flexibility to deal with the local situations on the ground. The new IHR(2005 call for accountability. They also call for strengthened national capacity for surveillance and control; prevention, alert, and response to international public health emergencies beyond the traditional short list of required reporting; global partnership and collaboration; and human rights, obligations, accountability, and procedures of monitoring. Under these evolved regulations, as well as other measures, such as the Revolving Fund for vaccine procurement of the Pan American Health Organization (PAHO, global health security could be maintained in the response to urban yellow fever in Paraguay in 2008 and the influenza (H1N1 pandemic of 2009-2010.

  4. 76 FR 64136 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-10-17

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... International Securities Exchange, LLC (the ``Exchange'' or ``ISE'') filed with the Securities and Exchange... the self-regulatory organization. The Commission is publishing this notice to solicit comments on...

  5. INTERNATIONAL SECURITY RELATIONS AND POST-IMPERIAL ORDERS

    Directory of Open Access Journals (Sweden)

    Radu-Sebastian UNGUREANU

    2011-08-01

    Full Text Available This paper intends to investigate the relations between former imperial powers and new sovereign states succeeding an empire in the field of international security, particularly when involving the use of force. Despite their stated attachment to the normative principles of what we usually call “Westphalian order”, former imperial powers continue to interfere in the domestic affairs of these new states, especially those unable to exercise their sovereignty efficiently and legitimately. One could say that, by military interventions, these powers deny the sovereignty of weak states in the regions once under their control; but the preparation of these missions makes the actions not to be interpreted as expressions of an imperialist attitude. I consider there are two major ideal-types that could better explain such interventions. In a power-oriented post-imperial order, the intervention of a former empire is the result of the projection of its national interests and identities. In a norm-oriented post-imperial order, the sense of moral responsibility of the former imperial power is the main reason for its interference. The intervention’s legitimacy and suitability require domestic and international support. This paper, grounded on a constructivist approach, intends to contribute to the understanding of international security issues in terms of a world shaped by actors’ interests and identities and the dynamics of their relations. The identified ideal-types of post-imperial orders consider both material and cultural factors. The analytical elements that may link extremely different situations are the socially variable interpretations of past and present.

  6. HTTP Packet Inspection Policy for Improvising Internal Network Security

    Directory of Open Access Journals (Sweden)

    Kuldeep Tomar

    2014-10-01

    Full Text Available Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security breaches have also increased. Data on a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are lots of mechanisms available but still they are not good enough because of dynamic environment. Such kind of attacks can be countered by applying appropriate policies on network edge devices like Adaptive Security Appliance, firewalls, web servers, router etc. Also the packets which are transferred between networks, they should deeply inspect for malicious or any insecure contents. In this paper firstly we would study Network security issues and available mechanism to counter them our focus would be on inspecting the HTTP packets deeply by applying policies on ASA. Finally we would use Graphical Network Simulator (GNS3 to test such a policy.

  7. A contribuição da escola de Copenhague aos estudos de segurança internacional The Copenhagen school's contribution to the area of international security studies

    Directory of Open Access Journals (Sweden)

    Grace Tanno

    2003-06-01

    Full Text Available O objetivo do artigo é apresentar a contribuição da Escola de Copenhague para a área de estudos de segurança internacional. Para tanto, será brevemente examinado o debate metateórico da área, assim como o contexto histórico no qual a Escola foi fundada. Em seguida, o artigo apresenta as críticas feitas às teses por ela formuladas. Finalmente, tornar-se-á claro que, além de terem dado uma contribuição significativa aos estudos de segurança, os trabalhos da Escola também contribuíram para a área de teoria das Relações Internacionais.This article seeks to introduce the Copenhagen's School contribution to the area of international security studies. It does so by discussing briefly the metatheoretical debate of the area, as well the historical context in which the School was founded. It will also be necessary to analyse the main concepts and theoretical perspectives developed by the School. Thereafter, the article shall present the criticism made to the School's contribution. At last, it may become clear that the School's contribution has gone beyond the area of security studies since it has also contributed to the area of theory of international relations.

  8. 15 CFR 971.405 - Breach of international peace and security involving armed conflict.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Breach of international peace and..., Modification/revision; Suspension/revocation § 971.405 Breach of international peace and security involving... expected to lead to a breach of international peace and security involving armed conflict....

  9. 15 CFR 970.505 - Breach of international peace and security involving armed conflict.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Breach of international peace and.../revision; Suspension/revocation § 970.505 Breach of international peace and security involving armed... to a breach of international peace and security involving armed conflict....

  10. Examining the potential impacts of climate change on international security: EU-Africa partnership on climate change

    OpenAIRE

    Dodo, Mahamat K.

    2014-01-01

    Abstract Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many St...

  11. From Camps to Conversations in Critical Security Studies

    DEFF Research Database (Denmark)

    Hansen, Lene

    2008-01-01

    The article reviews the book "Critical Approaches to International Security," by Karin M. Fierke......The article reviews the book "Critical Approaches to International Security," by Karin M. Fierke...

  12. The International Court of Justice and the Legality of UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Ušiak Jaroslav

    2014-09-01

    Full Text Available Through the United Nation’s Charter, the UN Security Council represents the most powerful executive institutional body in the field of collective security. Moreover, its ultra vires acts may have distinct legal consequences. Accordingly, questions arising from these facts are whether such a large scope of competences could be abused, what are the limits of the executed power and above all, affirmation of the legality of the actions of Council. Predominantly by means of the analytical method as well as a case study of the Lockerbie case, the present study provides the related argumentative discourse. Notwithstanding the fact that the decisions of the Council appear to be without any limitations, it is obliged to act within the purposes and principles of the UN Charter. The opinion of the International Court of Justice on the legality of the SC’s actions in the field of collective security are still, however, indirectly expressed through its general function.

  13. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  14. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World

    Science.gov (United States)

    2011-05-01

    incompatible with effective law enforcement, anonymity, the protection of children and secure infrastructure In reality, good cybersecurity can...international partners We will expand these capabilities through international collaboration to enhance overall resil - ience The United States will

  15. Household Food Security Study Summaries. 2001 Edition.

    Science.gov (United States)

    Seavey, Dorie; Sullivan, Ashley F.

    This report provides the most recent data on the food security of United States households. Based on studies using the Food Security Core Module (FSCM), a tool facilitating direct documentation of the extent of food insecurity and hunger caused by income limitations, this report summarizes 35 studies representing 20 states and Canada. The report…

  16. The DISAM Journal of International Security Assistance Management. Volume 23, Number 2, Winter 2001

    Science.gov (United States)

    2001-01-01

    The DISAM Journal, Winter 2001 90 Protection Project to continue its study of international trafficking , prostitution, slavery, debt bondage and other...amounting to debt bondage , involuntary servitude, or slavery. This includes about 50,000 women and children trafficked annually into the U.S. [Section 102...promoting respect for human rights of trafficking victims, and assisting the Organization for Security and Cooperation in Europe (OSCE) participating

  17. Impact of Internal Marketing on Employees' Customer Orientation in Social Security Organization of Gilan

    Directory of Open Access Journals (Sweden)

    Rashid Shadab Jouposhti

    2016-12-01

    Full Text Available With increasing completion between public and private insurance companiesand Social Security Organization as the greatest insurance organization the country, mangers of this organization inevitably seek for the ways to acquire higher customer satisfaction and loyalty so as to obtain and retain higher share of insurers. Meanwhile, role of employees in retention and increasing insurers is evident to all. Satisfied employees can focus their entire attempt for absorbing and retaining customer satisfaction. Internal marketing is the concept which can help Social Security Organization in gaining the goals. Thus, current research was conducted aiming at investigating impact of internal marketing on employees’ customer orientation in Social Security Organization of Gilanprovince. Descriptive-survey research method was used based on structural equation modeling which is recognized as a model for indicating internal marketing impact on customer orientation considering reviewed literature and research hypotheses, fit of which is suitable according to LISREL8 8.5 output. In the current research, internal marketing is considered asindependentvariable and costumer orientation is considered asdependentvariable and organizational commitment acts role as mediator variable. Stratified random sampling method was used for sampling in this research and field study and questionnaire was used for data collection. Statistical population included employees of Social Security Organization of Gilanprovince (N = 677. Following distribution of questionnaires, 244 perfect ones were collected. Research hypotheses were tested using structural equations method. Following analysis of questionnaire data, all research hypotheses were supported and it was shown that organizational commitment plays intermediary role in relationship between internal marketing and customer orientation

  18. 78 FR 77519 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-23

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... thereunder,\\2\\ notice is hereby given that, on December 5, 2013, the International Securities Exchange, LLC... handle enforcement jurisdiction in this manner. See supra note 6. With respect to arbitration...

  19. 77 FR 3295 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-01-23

    ...] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate...\\ notice is hereby given that, on January 3, 2012, the International Securities Exchange, LLC (the... interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory...

  20. 76 FR 60574 - Self-Regulatory Organizations; International Securities Exchange, Incorporated; Notice of...

    Science.gov (United States)

    2011-09-29

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, Incorporated; Notice of Proposed... given that on September 21, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the.... 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the Terms of...

  1. 78 FR 65400 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-10-31

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... thereunder,\\2\\ notice is hereby given that on October 17, 2013, the International Securities Exchange, LLC... the self-regulatory organization. The Commission is publishing this notice to solicit comments on...

  2. 77 FR 40121 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-07-06

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...\\ notice is hereby given that on June 20, 2012, the International Securities Exchange, LLC (the ``Exchange... Organization's Statement of the Terms of Substance of the Proposed Rule Change The ISE proposes to amend...

  3. 77 FR 3308 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-01-23

    ...] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate... 19b-4 thereunder,\\2\\ notice is hereby given that, on January 5, 2012, the International Securities... Organization's Statement of the Terms of Substance of the Proposed Rule Change The ISE is proposing to...

  4. 75 FR 27029 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-05-13

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... 19b-4 thereunder,\\2\\ notice is hereby given that on April 30, 2010, the International Securities... prepared by the self- regulatory organization. The Commission is publishing this notice to solicit...

  5. 78 FR 48742 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-08-09

    ... COMMISSION Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and... thereunder,\\2\\ notice is hereby given that on July 23, 2013, Miami International Securities Exchange LLC...- regulatory organization. The Commission is publishing this notice to solicit comments on the proposed...

  6. 76 FR 2173 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-01-12

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... thereunder,\\2\\ notice is hereby given that on January 5, 2011, the International Securities Exchange, LLC... interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory...

  7. 78 FR 78435 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-26

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... thereunder,\\2\\ notice is hereby given that on December 18, 2013, the International Securities Exchange, LLC.... \\1\\ 15 U.S.C. 78s(b)(1) \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of...

  8. 76 FR 21416 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-04-15

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...\\ notice is hereby given that on April 7, 2011, the International Securities Exchange, LLC (the ``Exchange... described in Items I, II, and III below, which items have been prepared by the self-regulatory...

  9. 76 FR 77275 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-12-12

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of... on November 29, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE...(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the Terms of...

  10. 78 FR 11921 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-02-20

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of... 19b-4 thereunder,\\2\\ notice is hereby given that on February 6, 2013, the International Securities... self-regulatory organization. The Commission is publishing this notice to solicit comments on...

  11. 76 FR 41850 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-07-15

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of... on July 1, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the Terms of Substance of...

  12. 77 FR 17102 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-03-23

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...\\ notice is hereby given that on March 7, 2012, the International Securities Exchange, LLC (the ``Exchange.... \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of...

  13. 77 FR 35729 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-14

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... hereby given that on June 1, 2012, the International Securities Exchange, LLC (the ``Exchange'' or the.... 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the Terms of...

  14. 77 FR 14847 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-03-13

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...,\\2\\ notice is hereby given that on February 22, 2012, the International Securities Exchange, LLC (the... interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory...

  15. 75 FR 79058 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-12-17

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...\\ notice is hereby given that on November 30, 2010, the International Securities Exchange, LLC (the...-regulatory organization. The Commission is publishing this notice to ] solicit comments on the proposed...

  16. 78 FR 75439 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-11

    ... COMMISSION Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and... is hereby given that on November 26, 2013, Miami International Securities Exchange LLC (``MIAX'' or.... 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the Terms of...

  17. What's Wrong with the Relationship between the International Court of Justice and the Security Council?

    NARCIS (Netherlands)

    Spijkers, O.

    2015-01-01

    In 1945, the drafters of the United Nations Charter provided that, whenever the UN Security Council needed advice on any legal question, it could always ask the International Court of Justice for an advisory opinion. And whenever the Council, when maintaining international peace and security, encoun

  18. 78 FR 41183 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2013-07-09

    ... source of independent advice on all aspects of arms control, disarmament, political-military affairs, international security and related aspects of public diplomacy. The agenda for this meeting will include... control, international security, nuclear proliferation, and diplomacy. For more information, contact...

  19. 77 FR 47162 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2012-08-07

    ... source of independent advice on all aspects of arms control, disarmament, political-military affairs, international security and related aspects of public diplomacy. The agenda for this meeting will include... arms control, international security, nuclear proliferation, and diplomacy. For more information...

  20. 77 FR 21142 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2012-04-09

    ... source of independent advice on all aspects of arms control, disarmament, political-military affairs, international security and related aspects of public diplomacy. The agenda for this meeting will include... arms control, international security, nuclear proliferation, and diplomacy. For more information...

  1. International user studies

    DEFF Research Database (Denmark)

    Nielsen, Lene; Madsen, Sabine; Jensen, Iben;

    in Sydhavnen, and it is funded by InfinIT. Based on a qualitative interview study with 15 user researchers from 11 different companies, we have investigated how companies collect and present data about users on international markets. Key findings are: Companies do not collect data about end users in all....../region. The preferred data collection method is field studies. If possible, user researchers choose to go to the field themselves to gain rich insights and to control the data collection process. The main insights companies gain from international user studies are (1) that there are many similarities among end users...... across nationalities and (2) that it often is more important to focus on and take differences in market conditions into account than national culture per se. Companies are in the process of finding out how best to present the insights about international end users to their employees. However, so far...

  2. Simulation in International Studies

    Science.gov (United States)

    Boyer, Mark A.

    2011-01-01

    Social scientists have long worked to replicate real-world phenomena in their research and teaching environments. Unlike our biophysical science colleagues, we are faced with an area of study that is not governed by the laws of physics and other more predictable relationships. As a result, social scientists, and international studies scholars more…

  3. International user studies

    DEFF Research Database (Denmark)

    Nielsen, Lene; Madsen, Sabine; Jensen, Iben

    across nationalities and (2) that it often is more important to focus on and take differences in market conditions into account than national culture per se. Companies are in the process of finding out how best to present the insights about international end users to their employees. However, so far...... a company’s general attitude and approach to (1) international markets and (2) user studies. Lastly, we present the theoretical ideas and concepts about culture that has informed the research....... in Sydhavnen, and it is funded by InfinIT. Based on a qualitative interview study with 15 user researchers from 11 different companies, we have investigated how companies collect and present data about users on international markets. Key findings are: Companies do not collect data about end users in all...

  4. Social Security Fund Ready to Enter International Market

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Vice-Chairman of the Board of the National Social Security Fund Council. Feng Jianshen. revealed recently that. from now on. China plans to use five years or even a longer thne to make the total social security fund assets reach RMB 1 tillion and build the National Social Security Fund Council into a world first-rate old-age pension administrative agency.Feng emphasized that after three years' operation, social security fund has entered into a crucial period. The key lies in innovation, which, first of ...

  5. LA SEGURIDAD INTERNACIONAL: VINO VIEJO EN BOTELLAS NUEVAS International Security: Old Wine in New Bottles

    Directory of Open Access Journals (Sweden)

    Arturo Sotomayor Velásquez

    2007-01-01

    Full Text Available La seguridad internacional es un concepto complejo y contestado, cargado de valores y juicios. Por siglos, el concepto fue asociado al estudio de la guerra, la estrategia militar y otras formas alternativas al uso de la fuerza. Mientras pocos disputan este enfoque de la seguridad, otros consideran necesario extender y ampliar su significado para incluirá otros valores e intereses. Sugieren incluirá temas ambientales, nutrición y protección de derechos humanos. No obstante, ¿dónde deben demarcarse los límites de la seguridad internacional?, ¿qué debe será excluido e incluido?, ¿la seguridad internacional ha cambiado de tal forma que requerimos una reconceptualización ? Este artículo argumenta que en la era de la post-guerra fría la expansión del concepto de seguridad internacional ha incluido tanto en su definición que el proceso de adquisición de conocimiento se ha vuelto fútil. Aún más , se exageran los procesos de cambio internacional en tanto que se olvidan las constantes internacionales en materia de estrategia militarInternational security is a complex and contested concept, heavily laden with values and judgments. For centuries, however, it was linked to the study of war, military strategy and alternatives to the use of force as an instrument of policy. While few would be likely to dispute these examples as issues of security, many would now extend its meaning to other values and interests. They would apply the term to environmental damage, hunger, and protection of human rights. But where do we draw the line in studying international security? What should be included or excluded? Has international security changed in such a way that we now need to re-define the concept? This article argues that in today" s post-Cold War world, we seem to have included so much in our definition of security that that we have posed the problem in ways that impede our questá for knowledge. Furthermore, international security

  6. The Impact of Ecological Environment Problem on the International Security%生态环境问题对国际安全的影响

    Institute of Scientific and Technical Information of China (English)

    崔颖

    2005-01-01

    Ecological environment is the material prerequisite and natural foundation for human subsistence and developmant. Since the end of the Cold War, the ecological environment problem, a non - traditional security factor, has been one of the focuses in international studies. This paper, from the viewpoint of transnational environment problem, resources dispute, refugee and exotic invasion, tries to analyze its impact on the international security.

  7. NATO Intervention in Kosovo in light of Security Council Actions and International Law

    Directory of Open Access Journals (Sweden)

    MA. Arben Salihu

    2013-12-01

    Full Text Available The horrors of World War Two made it universally clear that the world cannot progress without general respect for human rights. Still, the need for humanitarian intervention arose several times before 1999, but international political and military organisations including the UN, were either late or hesitant to prevent genocides or other related human catastrophes worldwide. The NATO intervention in Kosovo, however, marked the beginning of the new era in international relations. The facet of this intervention in view of legality is the topic of this paper. The aim of this study, above all, is to analyze the Security Council actions, debates and resolutions concerning situation in Kosovo, and the level of impact that the military operation had in international law (in particular and international relations (in general.  The study uses many authentic documents issued by the United Nations Security Council itself and other material related to the theme in order to develop an argument on the points raised. Throughout, this research paper has attempted to answer numerous issues related to the topic and offer a balanced view on the all the themes examined. Several but distinct points raised focus on relevant core subjects, discuss the challenges and opportunities of the humanitarian intervention and offer recommendations regarding the future of such operation for the well being of the humanity.

  8. American Security and the International Energy Situation. Volume 2. World Energy and the Security of Supply

    Science.gov (United States)

    1975-04-15

    DEPENDABILITY. 1975-,905 VI THE OUTLOOK FOR WORLD ENERGY INTERDEPENDENCE ,„ Supply, Demand, OPEC and Prices Energy Interdependence...the outlook of the world energy market is speculated upon in Chapter Vi and the resulting patterns of interdependence are subse...theme of this study is the relationship of Interdepen- dence which characterizes the world energy system. From the standpoint of the international

  9. International militaries and postwar security in disputed areas : The purpose, outcome, and potential of KFOR in Kosovo

    OpenAIRE

    2012-01-01

    This study takes a conceptualising approach to the case of KFOR and Kosovo. To understand the purpose, outcome, and potential of KFOR in the Kosovo conflict, and to allow for this understanding to have potential validity beyond this specific case, it was essential to clearly define KFOR as a concept. KFOR is understood as an international military presence responsible for the security component of a postwar statebuilding mission, a concept which consists of the provision of a secure environme...

  10. THE FAILURE OF COLLECTIVE SECURITY IN THE POST WORLD WARS I AND II INTERNATIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSEPH C. EBEGBULEM

    2012-05-01

    Full Text Available The League of Nations and the United Nations Organization were two post-World War (World War I and World War II organizations established for the maintenance of peace and security in the international system. One of the cardinal objectives of these organizations was the promotion of a Collective Security System which was considered as vital in the pursuit of global peace and security. In other words, Collective Security is an institutional mechanism established to address a comprehensive list of major threats to peace and security around the world. With the escalation of conflicts and wars in different parts of the world, there is therefore the need for collective responses at global, regional and national levels in conflict situations. The achievement of collective security in the international system would be based on the principle that any attack on any member of the United Nations would be considered as an attack on all the members. After a panoramic discourse of the meaning and nature of Collective Security, the paper also examines the problems of collective security in the international system; its failure under the League of Nations and the United Nations. The paper concludes that the weaknesses inherent in the system do not make it unuseful as it is a relevant factor in the maintenance of international peace and security.

  11. Crimes against Information Security: International Legal Aspects of Fighting and Experience of Some States

    Directory of Open Access Journals (Sweden)

    MARINA ALEKSANDROVNA EFREMOVA

    2016-04-01

    Full Text Available This article is devoted to the study of foreign criminal law providing for liability for information security offences. The relevance of that problem is driven by the intensifying IT development and globalization, under which both information security of a separate state and international information security may not be achieved by the efforts of a single state. Efforts need to be consolidated, and a uniform approach to the solution of that matter needs to be worked out. The author stresses that in the Russian Federation and in most foreign countries there is no systematic approach to criminal law protection of information security except for the Republic of Poland. In most foreign criminal codes JIBC April 2016, Vol. 21, No.S3 - 2 - (CC, the provisions on information security protection are spread all over Special parts. In most foreign countries, offences against confidentiality of professional and official secrets are criminalized, while in the Civil Code of the RF such provisions are missing. Meantime, foreign criminal law does not specify separate elements of crimes in order to protect tax secrets. Criminal law protection of state secret is solved differently in foreign countries: via detailed regulation for state secret offences and under totally missing respective provisions in CC. Regarding cybercrime, the CIS countries used to apply the uniform approach to criminalization of respective elements of crime as criminal laws of most of them adopted the provisions of Model Criminal Code of the CIS member states. However, in future, due to the amendments of articles providing for liability for cybercrime that approach was lost. In foreign countries, along with the traditional illegal access to computer information, the liability is provided for computer sabotage, computer fraud. The author opines that a systematic approach is required to criminal law protection both in the Russian Federation and in foreign countries. Only uniform, joint

  12. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  13. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  14. Proceedings 8th International Workshop on Security Issues in Concurrency

    CERN Document Server

    Chatzikokolakis, Konstantinos; 10.4204/EPTCS.51

    2011-01-01

    This volume contains the proceedings of the 8th Workshop on Security Issues in Concurrency (SecCo 2010). The workshop was held in Paris, France on August 30th, 2010, as a satellite workshop of CONCUR'10. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests and stimulating discussions on central research questions. In particular, we called for papers dealing with security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service, service availability, safety aspects, fault tolerance, trust, language-based security, probabilistic and information theoretic models) in emerging fields like web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing, global/ubiquitous/pervasive computing.

  15. Proceedings 7th International Workshop on Security Issues in Concurrency

    CERN Document Server

    Boreale, Michele; 10.4204/EPTCS.7

    2009-01-01

    This volume contains the proceedings of the 7th Workshop on Security Issues in Concurrency (SecCo'09). The workshop was held in Bologna, Italy on September 5th 2009, as a satellite workshop of CONCUR'09. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests and stimulating discussions on central research questions. In particular, we called for papers dealing with security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service, service availability, safety aspects, fault tolerance, trust, language-based security, probabilistic and information theoretic models) in emerging fields like web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing, global/ubiquitous/pervasive computing.

  16. 33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA

    Science.gov (United States)

    2010-07-01

    .../departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters... Guard District § 165.113 Security Zone: Dignitary arrival/departure Logan International Airport, Boston... governments arriving at, or departing from, Logan International Airport and as determined by the transit...

  17. The Exploration on the Digital Construction of the Acdemic Journals- Taking the International Security Studies as Example%学术期刊数字化建设探究--以《国际安全研究》为例

    Institute of Scientific and Technical Information of China (English)

    苏娟

    2014-01-01

    The digitization of the acdemic journals not only represents the future and direction of the acdemic journal industry, but also the inevitable trend of the social development. In its way of digitization, the International Security Studies has taken measures as adding large journal website database, creating separate sites, publishing online digital dates in advance, opening the access of visit and adopting academic misconduct detection system, which has made some achievements. At the same time, The International Security Studies, like many domestic acdemic journals, encounters some urgent problemes. At this stage, the digital construction of the acdemic journals should focus on the content, strengthen personalized service to online readers, enhance awareness of digital copyright protection, develop priorities of digital publishing, and consolidate digital awareness and information literacy of the editing body. In the development of digital construction, initiatives should be taken to highlight the characteristics and build its competiveness of academic journals.%学术期刊数字化不仅代表学术期刊业的未来和方向,也是整个社会发展的必然趋势。《国际安全研究》在数字化建设中采取了诸如加入大型期刊集群网站数据库、创建独立网站、在线数字提前出版、开放访问、采用学术不端检测系统等措施,取得了一定的成效;但是同国内许多学术期刊一样,发展中也遇到了亟待探索解决的问题。现阶段,学术期刊数字化建设,应该以“内容为王”,加强读者在线个性化服务,增强数字版权保护意识,发展优先数字出版,强化编辑主体数字化意识和信息素养。在学术期刊数字化建设过程中,主动出击,彰显学术期刊特色,打造学术期刊精品。

  18. 6th Annual International Conference on ICT: Big Data, Cloud and Security

    CERN Document Server

    2015-01-01

    The Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2015) serves as a platform for industry professionals, academics, researchers, scientists, consultants and policy makers to interact and discuss various issues in big data, cloud computing and IT security.

  19. 76 FR 40758 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2011-07-11

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders July 5, 2011. I. Introduction On May 23, 2011, the...

  20. 78 FR 70382 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-11-25

    ... Exchange is proposing to adopt a definition of expiration date and add language to its rules that reflects... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing...

  1. A Case Study on E - Banking Security – When Security Becomes Too Sophisticated for the User to Access Their Information

    Directory of Open Access Journals (Sweden)

    Aaron M. French

    2012-08-01

    Full Text Available While eBanking security continues to increase in sophistication to protect against threats, the usability of the eBanking decreases resulting in poor security behaviors by the users. The current research evaluates se curity risks and measures taken for eBanking solutions. A case study is presented describing how increased complexity decreases vulnerabilities online but increases vulnerabilities from internal threats and eBanking users

  2. 75 FR 28672 - Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures...

    Science.gov (United States)

    2010-05-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures Against Two... measures on two Russian entities. DATES: Effective Date: May 21, 2010. FOR FURTHER INFORMATION CONTACT...

  3. NINJA: a noninvasive framework for internal computer security hardening

    Science.gov (United States)

    Allen, Thomas G.; Thomson, Steve

    2004-07-01

    Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive

  4. Border Security: Barriers Along the U.S. International Border

    Science.gov (United States)

    2006-10-30

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL33659 Border Security...Presidencia,” May 12, 2005. Translation by CRS. Available at [http://www.presidencia.gob.mx/actividades/crecimiento/?contenido=18195& pagina =31]. Last

  5. The Role of Pulsed Power in International Security and Counterterrorism

    Science.gov (United States)

    2013-06-01

    applied pulsed power technology are presented. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES...pathogens, such as pestis yersinia or hemorrhagic variola, would require the detection of a single microbe, a difficult task in any situation and an

  6. Energy security assessment framework and three case-studies

    OpenAIRE

    2013-01-01

    This chapter provides a novel framework for assessing energy security and illustrates its application by the Global Energy Assessment, the IEA Model for Short-term energy security and in several studies of long-term global energy security.

  7. [International cohort studies].

    Science.gov (United States)

    Ahrens, W; Pigeot, I

    2012-06-01

    Among observational studies, cohort studies, i.e. longitudinal observations of selected population groups, provide the highest possible evidence of a causal association between specific risk factors (exposure) and the occurrence of disease in populations. Besides the fact that many exposures cannot be investigated in experimental designs, cohort studies have the advantage over randomized clinical trials that they are conducted in free living populations and not in restrictive, clinical settings. In this paper we describe the aims and features of international cohorts that have been selected because of their impact, their size or their endpoints. We do not only present the study designs and survey instruments used but we also highlight some of the most important results gained by these studies. Most of these prospective studies investigated common chronic diseases in the elderly, such as cancer, diabetes, cardiovascular or neurodegenerative diseases, osteoporosis and ophthalmologic disorders. Newer cohorts and recent reassessments of existing cohorts almost always include the collection and storage of biological samples. In recent years technological developments allowed the implementation of cutting edge measurement procedures, such as imaging techniques for phenotyping. Finally, we discuss on the one hand whether these designs can be transferred to the German situation and on the other hand to what degree the results obtained from foreign cohorts can be generalized for the German population. We conclude with recommendations for future cohort studies.

  8. A Study of Steganographic Image Security

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are proposed, and both algorithms embed the secret image after taking full advantage of wavelet transform(WT) to compress it. (b) Introducing the CDMA concept in communication theory, a novel kind of image cryptosystem—image hiding cryptosystem of image division multiple access is proposed. We encrypt key information of several secret images and then hide them into an image, which is an ordinary image. After receivers get the image, each receiver can restore corresponding secret image independently. Compared with other image encryption algorithms, our new image hiding cryptosystem can compress secret image data efficiently. Moreover, the security and practicability of our system is better. (2) Digital watermarking is the most important branch of information hiding, which has been the hotspot of international academia. Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. In this field, the following results are achieved: (a) A new frequency information hiding and watermarking algorithm based on WT and Discrete Cosine Transform(DCT) is presented. After compressed by WT, the information of secret image is embedded into DCT domain. The algorithm has good imperceptibility and security and is robust against JPEG compressing and cropping. The algorithm can be used to embed watermark into images, and the watermark may be one 256-color picture or more and more than one secret image can be hidden into a

  9. Russian energy diplomacy and international energy security (geopolitics and economics)

    OpenAIRE

    Zhiznin Stanislav

    2010-01-01

    This article considers national energy security as a component of foreign policy and diplomacy and analyses the current state of Russian policy in the energy sector, the role of Russia in global energy geopolitics and the factors affecting it. The author examines energy diplomacy as an instrument of foreign policy at both global and regional levels taking into account the changes in the corporate policy of energy companies.

  10. Russian energy diplomacy and international energy security (geopolitics and economics

    Directory of Open Access Journals (Sweden)

    Zhiznin Stanislav

    2010-03-01

    Full Text Available This article considers national energy security as a component of foreign policy and diplomacy and analyses the current state of Russian energy policy, the role of Russia in global energy geopolitics and the factors affecting it. The author examines energy diplomacy as an instrument of foreign policy at both global and regional levels taking into account the changes in the corporate policy of energy companies.

  11. Promoting International Energy Security: Volume 4, The Gulf of Guinea

    Science.gov (United States)

    2012-01-01

    Acquisition of Exploration Blocks in Gabon,” Form 6-K filing with the U.S. Securities and Exchange Commission, File number 1-15106, Rio de Janeiro ...of supplies of oil and natural gas. This is particularly the case in the Gulf of Guinea. In this area, the largest and most important exporter is...reported, not only in Nigeria, but also in the territorial waters of Ghana, whose political stability and governance conditions are higher. In this

  12. Intelligence Studies, Universities and Security

    Science.gov (United States)

    Glees, Anthony

    2015-01-01

    This article offers a critical assessment of academic intelligence studies in higher education. It argues that universities (and academics) should value this subject far more highly than they currently do. Doing so will enhance better public understanding of an increasingly important and unique device in modern governance. It will also improve the…

  13. 78 FR 1901 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-01-09

    ... COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and... Rule 19b-4 thereunder,\\2\\ notice is hereby given that on December 21, 2012, the International... change references in Supplementary Material .01 from NASD to FINRA. ISE Rule 1800 (Arbitration) is being...

  14. 76 FR 31385 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-05-31

    ... COMMISSION [Release No. 34-64538; File No. SR-ISE-2011-30) Self-Regulatory Organizations; International... thereunder,\\2\\ notice is hereby given that on May 23, 2011, the International Securities Exchange, LLC (the.... \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of...

  15. UN Security Council Practice and the Search for International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2014-01-01

    The arrest in March 2011 of 15 children in Daraa, Syria, triggered local protests that grew rapidly. The Government responded with force and the ensuing violence escalated into a civil war that continues today. Separate independent reports have since found evidence of widespread violations...... of international law including the use of chemical weapons, massacres, torture, sexual violence, unlawful killings and an array of other war crimes and crimes against humanity. With egregious violations of international law apparent, and an enormous and growing refugee crisis, the gaze of the international...

  16. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Science.gov (United States)

    2010-04-01

    ... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and...

  17. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  18. Security interests under the UNIDROIT Convention on International Interests in Mobile Equipment 2001

    OpenAIRE

    Saidova, Sanam

    2012-01-01

    This work examines security interests under the Cape Town Convention on International Interests in Mobile Equipment. The main purpose of the Convention is to provide a uniform legal regime for the creation, registration and protection of a creditor’s interests held in high value types of mobile equipment, such as aircraft, railway and space objects. The Convention provides for the creation of an autonomous international interest in these types of equipment and establishes an electronic Intern...

  19. Special Collections Library Security: An Internal Audit Perspective.

    Science.gov (United States)

    Chadwick, William E.

    1998-01-01

    Because of the high incidence of special-collections thefts and embezzlements during the past decade, library management must reassess its "user friendly" philosophy for both library patrons and employees. An internal control system is described. Causes of theft, and policies and procedures for protecting the collection are discussed. (AEF)

  20. The collective security system and the enforcement of international law

    NARCIS (Netherlands)

    d' Aspremont, J.; Weller, M.

    2015-01-01

    After a few brief terminological remarks on the concepts of enforcement, coercion and sanction, this chapter will briefly recall the theoretical debates about the role of enforcement in our understanding of international law. A few observations will then be formulated as to how the creation of a col

  1. International Business Studies.

    Science.gov (United States)

    Hendon, Donald W.

    The new International Business major within the School of Business, begun in fall 1989, is an ongoing, enriched program for highly motivated students of above-average scholastic achievement. Its primary purposes are to (1) prepare students to understand America's trading partners and (2) teach the technical knowledge needed in an international…

  2. A New KFOR: Changes for International Security in Kosovo

    Science.gov (United States)

    2006-03-15

    associations that “emerged from war" (KLA veterans, KLA invalids, and families of martyrs) were organized in Pristina, Prizren , Peja/Pec and many other...municipalities (still reproducing anger over the 16 February arrest for war crimes of senior KPC figures from Prizren ). Anger against the internationals was...monasteries in Prizren . Similar situations happened in Gjakova/Djakovica, Peja/Pec, Kosovo Polje, Ferizaj/Urosevac, Lipjan/Lipljan, Gkiljan/Gniljane and Novo

  3. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Science.gov (United States)

    2010-04-01

    ... internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES... Company Rules § 240.17Ad-13 Annual study and evaluation of internal accounting control. (a) Accountant's... accountant concerning the transfer agent's system of internal accounting control and related procedures...

  4. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  5. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  6. International Research and Studies Program

    Science.gov (United States)

    Office of Postsecondary Education, US Department of Education, 2012

    2012-01-01

    The International Research and Studies Program supports surveys, studies, and instructional materials development to improve and strengthen instruction in modern foreign languages, area studies, and other international fields. The purpose of the program is to improve and strengthen instruction in modern foreign languages, area studies and other…

  7. Study on Network Security Architecture for Power Systems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.

  8. Environmental Security: Evolution of a New Concept in Security Studies

    Science.gov (United States)

    1999-04-01

    precipitated by a need for oil, iron ore, and rubber, and the near extinction of American Indians revolved around gold and scarce farming land. These are but...environmental commitment, international treaties stabilize energy use (and eliminate the internal-combustion engine), recycling eliminates waste, rainforests ...when we lose a species to extinction we lose their potential benefits to all mankind. Climate change and energy consumption have to be addressed and

  9. Building International Genomics Collaboration for Global Health Security.

    Science.gov (United States)

    Cui, Helen H; Erkkila, Tracy; Chain, Patrick S G; Vuyisich, Momchilo

    2015-01-01

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installation of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.

  10. Building International Genomics Collaboration for Global Health Security

    Directory of Open Access Journals (Sweden)

    Helen H Cui

    2015-12-01

    Full Text Available Genome science and technologies are transforming life sciences globally in many ways, and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement and installation of next generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.

  11. A Comparative Study for Performance Measurement of Selected Security Tools

    Directory of Open Access Journals (Sweden)

    Bhaskar.V. Patil,

    2010-10-01

    Full Text Available Today’s enterprise networks are distributed to different geographical locations and applications are more centrally located, this technological enhancement offers new flexible opportunities also measure security threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus attack, Trojans, worms etc. These threats can be minimized using number of network security tools and antivirus software, but all are not equally compatible for each type of attack hence the study is undertaken. This research paper highlights the performance of antivirus software using the number of parameters such as installation time, size, memory utilised, boot time, user interface launch time and full system scan time etc.

  12. CCNA Security Study Guide, Exam 640-553

    CERN Document Server

    Boyles, Tim

    2010-01-01

    A complete study guide for the new CCNA Security certification exam. In keeping with its status as the leading publisher of CCNA study guides, Sybex introduces the complete guide to the new CCNA security exam. The CCNA Security certification is the first step towards Cisco's new Cisco Certified Security Professional (CCSP) and Cisco Certified Internetworking Engineer-Security. With a foreword by CCNA networking authority Todd Lammle, CCNA Security Study Guide fully covers every exam objective. The companion CD includes the Sybex Test Engine, flashcards, and a PDF of the book.: The CCNA Securit

  13. Security+ study guide study guide and practice exam

    CERN Document Server

    Dubrawsky, Ido; Dubrawsky

    2007-01-01

    Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test preparation software for the edge you need to achieve certification on your first try! This system is comprehensive, affordable, and effective!* Completely Guaranteed Coverage of All Exam ObjectivesAll five Security+ domains are covered in full: General Securi

  14. 78 FR 9768 - Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two...

    Science.gov (United States)

    2013-02-11

    ... of International Security and Nonproliferation Imposition of Missile Sanctions on Two Chinese Foreign.... SUMMARY: A determination has been made that two foreign persons in China have engaged in activities that...) . Accordingly, the following sanctions are being imposed on these foreign persons for two years: (A) Denial of...

  15. Predicting Preschoolers' Attachment Security from Fathers' Involvement, Internal Working Models, and Use of Social Support

    Science.gov (United States)

    Newland, Lisa A.; Coyl, Diana D.; Freeman, Harry

    2008-01-01

    Associations between preschoolers' attachment security, fathers' involvement (i.e. parenting behaviors and consistency) and fathering context (i.e. fathers' internal working models (IWMs) and use of social support) were examined in a subsample of 102 fathers, taken from a larger sample of 235 culturally diverse US families. The authors predicted…

  16. 76 FR 58076 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-09-19

    ... arms control, disarmament, political-military affairs, and international security and related aspects of public diplomacy. The agenda for this meeting will include classified discussions related to the..., nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman II, Executive...

  17. 76 FR 36167 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting

    Science.gov (United States)

    2011-06-21

    ... control, disarmament, political-military affairs, and international security and related aspects of public diplomacy. The agenda for this meeting will include classified discussions related to the Board's ongoing... proliferation, and diplomacy. For more information, contact Richard W. Hartman II, Executive Director of the...

  18. Validating Cyber Security Requirements: A Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  19. The Role of International Juridical Process in International Security and Civil-Military Relations

    Science.gov (United States)

    2002-12-01

    137 Elizabeth Neuffer , The Key to my neighbor’s house: Seeking Justice in Bosnia and Rwanda...Security Service, Word of Experts, CCMR Belgrade. Available [online] at: http//www.ccmr-bg.org/analize/rec/word2.htm, 11/10/2002. 37. Neuffer Elizabeth

  20. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... and international justice, with particular focus on regional arrangements. Herein “international justice” is the concept of criminal culpability and liability for internationally wrongful acts which give rise to individual criminal responsibility. The Council is unapologetically political but it is also obligated...

  1. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    Science.gov (United States)

    2010-12-01

    vessels—vessels capable of carrying 500 or more passengers. The first report focused on cruise ship and cruise ship facility security and was issued in...April 2010.4 The report found that while governmental agencies, cruise ship operators, and other maritime security stakeholders have taken...border security—should consider obtaining additional information about cruise ship passengers to enhance its screening process. This report focuses

  2. Developing Security Force Assistance: Lessons from Foreign Internal Defense

    Science.gov (United States)

    2008-11-18

    compromising them by developing a more complete framework for Colombia. Major Jose Madera notes, “Our Armed Forces can only be partially successful if...74 Finlayson, “U.S. Forces,” 68. 75 Jose A. Madera , Civil Information Management in Support of Counterinsurgency...Studies, 2008. Madera , Jose M. “Civil information Management in Support of Counterinsurgency Operations: A Case for the Use of Geospatial Information

  3. 2nd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Cortesi, Agostino; Saeed, Khalid; Chaki, Nabendu

    2016-01-01

    The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

  4. Protection and Effective Functioning of International Organizations. Final Report International Institutional Law; Secure Haven project

    NARCIS (Netherlands)

    Dikker Hupkes, S.D.

    2009-01-01

    This report deals with the legal relationship between International Organizations and their host states. It focuses on the ways in which the effective functioning of those International Organizations is ensured in the relevant seat agreements and multilateral treaties. The report deals specifically

  5. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2015-08-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  6. Proceedings of the International Conference on IT Convergence and Security 2011

    CERN Document Server

    Ahn, Seong

    2012-01-01

    As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1.      Introduction of the most recent information technology and its related ideas 2.      Applications and problems related to t...

  7. The concept of “Comprehensive security” as a draft for reconstructing security in a system of international relations

    Directory of Open Access Journals (Sweden)

    MSc. Dritëro Arifi

    2011-03-01

    Full Text Available To explain how applicable the concept of "comprehensive secu-rity" is in Kosovo, at first, I will try to analyze the term of security, and development of international relations in relation to the phe-nomenon of "Security". Initially the term “security” is to be elabo-rated, in theoretical terms, the impact "national security" had du-ring the Cold War, and the development of the international rela-tions system, especially after "the fall of the Berlin Wall,” and the fall of communism. In the broadest sense, the post- modern securi-ty is characterized by many threats, such as terrorism, failing sta-tes, climate change etc. The elements of comprehensive security will be part of the analysis of developments in Kosovo after the war and briefly transformation of the security sector after inde-pendence.

  8. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    OpenAIRE

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developing regions, but also the food system stability in general? To investigate this, an overview of international actors working in the field of wastage has been made, with a European/Dutch focus. Their...

  9. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Rabin, Michael W [Los Alamos National Laboratory

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  10. International biosecurity symposium : securing high consequence pathogens and toxins : symposium summary.

    Energy Technology Data Exchange (ETDEWEB)

    2004-06-01

    The National Nuclear Security Administration (NNSA) Office of Nonproliferation Policy sponsored an international biosecurity symposium at Sandia National Laboratories (SNL). The event, entitled 'Securing High Consequence Pathogens and Toxins', took place from February 1 to February 6, 2004 and was hosted by Dr. Reynolds M. Salerno, Principal Member of the Technical Staff and Program Manager of the Biosecurity program at Sandia. Over 60 bioscience and policy experts from 14 countries gathered to discuss biosecurity, a strategy aimed at preventing the theft and sabotage of dangerous pathogens and toxins from bioscience facilities. Presentations delivered during the symposium were interspersed with targeted discussions that elucidated, among other things, the need for subsequent regional workshops on biosecurity, and a desire for additional work toward developing international biosecurity guidelines.

  11. Irregular Warfare: The Maoist Challenge to India’s Internal Security

    Science.gov (United States)

    2012-12-01

    sharecroppers impoverished. They are all kept under perpetual bondage towards repayment of a small debt supposedly taken generations ago. The forest wealth...and lent them money for purchase of seeds and payment of taxes. Those unable to clear their debt were made to part with their land. In the process...semi-feudal bondage . Ganapathi, General Secretary, CPI (Maoist) Feb 19, 2007. 97 Singh: Maoist Challenge to India’s Internal Security Endnotes 1

  12. International Food Assistance: A U.S. Governmentwide Strategy Could Accelerate Progress Toward Global Food Security

    Science.gov (United States)

    2009-10-29

    Organization ( FAO ). Sub-Saharan Africa has the highest prevalence of food insecurity , with 1 out of every 3 people undernourished. Global... food security.1 This problem is especially severe in sub-Saharan Africa, the region where food insecurity is most prevalent with 1 out of every 3...estimates of the United Nations (UN) Food and Agriculture Organization ( FAO ). As the largest international donor, contributing over half of all food aid

  13. MINIMIZATION OF IMPACTS PERTAINING TO EXTERNAL AND INTERNAL ENERGY SECURITY THREATS OF THERMAL POWER PLANTS

    Directory of Open Access Journals (Sweden)

    V. Nagornov

    2012-01-01

    Full Text Available The paper contains a classification of internal and external threats for thermal power plants and recommendations on minimization of these risks. A set of concrete measures aimed at ensuring TPP energy security has been presented in the paper. The system comprises preventive measures aimed at reducing the possibilities of emergence and implementation of internal and external threats. The system also presupposes to decrease susceptibility of fuel- and energy supply systems to the threats, and application of liquidation measures that ensure elimination of emergency situation consequences and restoration of the conditions concerning fuel- and power supply to consumers.

  14. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  15. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  16. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  17. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  18. 77 FR 76411 - Security Zone; 25th Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2012-12-28

    ... [Docket No. USCG-2012-1077] RIN 1625-AA87 Security Zone; 25th Annual North American International Auto... International Auto Show (NAIAS), which is being held at Cobo Hall in downtown Detroit, MI. Vessels in close... International Auto Show (NAIAS) will be held at Cobo Hall in downtown Detroit, MI. The NAIAS is the prime...

  19. Linking Hydro-Meteorological Hazards, Climate and Food Security: an Initiative of International Scientific Community

    Science.gov (United States)

    Ismail-Zadeh, A.; Beer, T.

    2013-05-01

    Humans face climatic and hydro-meteorological hazards on different scales in time and space. In particular natural hazards can have disastrous impact in the short term (flood) and in the long term (drought) as they affect human life and health as well as impacting dramatically on the sustainable development of society. They represent a pending danger for vulnerable lifelines, infrastructure and the agricultural systems that depend on the water supply, reservoirs, pipelines, and power plants. Developed countries are affected, but the impact is disproportionate within the developing world. Extreme natural events such as extreme floods or prolonged drought can change the life and economic development of developing nations and stifle their development for decades. The beginning of the XX1st century has been marked by a significant number of natural disasters, such as floods, severe storms, wildfires, hurricanes, and tsunamis. Extreme natural events cause devastation resulting in loss of human life, large environmental damage, and partial or total loss of infrastructure that, in the longer time, will affect the potential for agricultural recovery. Recent catastrophic events of the early 21st century (e.g. floods in Pakistan and Thailand, the 2011 Tohoku earthquake and tsunami) remind us once again that there is a strong coupling between complex solid Earth, oceanic, and atmospheric processes and that even developed countries such as Japan are subject to agricultural declines as a result of disastrous hydro-meteorological events. Scientific community recognizes that communication between the groups of experts of various international organizations dealing with natural hazards and their activity in disaster risk reduction and food security needs to be strengthened. Several international scientific unions and intergovernmental institutions set up a consortium of experts to promote studies of weather, climate and their interaction with agriculture, food and their socio

  20. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  1. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  2. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  3. The growing rift between Africa and the International Criminal Court : The curious (im)possibility of a Security Council deferral

    NARCIS (Netherlands)

    Knottnerus, Abel; Lavranos, Nikos; Kok, Ruth

    2014-01-01

    Article 16 of the Rome Statute authorizes the United Nations Security Council to defer investigations and prosecutions of the International Criminal Court (ICC) for a renewable period of twelve months. In its decision of 12 October 2013, the Assembly of the African Union called upon the Security Cou

  4. International coalitions in Brazil’s foreign policy: security and governance reform

    Directory of Open Access Journals (Sweden)

    Alcides Costa Vaz

    2012-04-01

    Full Text Available The text analyses the relevance and role of international coalitions as instruments and arenas for negotiation in the context of Brazilian foreign policy under Luis Inácio Lula da Silva (2003-2010, and the perspectives they bring to the attainment of the goal of reforming the spaces and instruments of global governance in the political, economic and security spheres. Under Lula da Silva, Brazil supported and resorted intensively to coalitions not only for their instrumental value for consolidating the country’s international presence and actions, but also due to the possibility that they could induce systemic change towards a more uneven pattern of power distribution, thus helping to overcome lasting political and economic international asymmetries.

  5. 3rd International Doctoral Symposium on Applied Computation and Security Systems

    CERN Document Server

    Saeed, Khalid; Cortesi, Agostino; Chaki, Nabendu

    2017-01-01

    This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.

  6. Bio-terrorism, human security and public health: can international law bring them together in an age of globalization?

    Science.gov (United States)

    Aginam, Obijiofor

    2005-09-01

    Bio-terrorism, the use of a microorganism with the deliberate intent of causing infection, before and since the anthrax attacks in the United States in October 2001, has emerged as a real medical and public health threat. The link between bio-terrorism, human security and public health raises complex questions on the normative trajectories of international law, the mandates of international organizations, and global health governance. In May 2001, the World Health Assembly of the World Health Organization (WHO) passed a resolution entitled "Global Health Security: Epidemic Alert and Response" which inter alia, urged WHO member states to participate actively in the verification and validation of surveillance data and information concerning health emergencies of international concern. This article explores the links between bio-terrorism, human security and public health, and investigates the effectiveness of international legal mechanisms that link them in an age of globalization of public health. The article explores the interaction of WHO's 'soft-law' approaches to global health security, and the 'moribund' negotiations of the verification and monitoring protocol to the Biological Weapons Convention 1972. Can international law link bio-terrorism, public health and human security? Does the WHO collaborate with other international organizations within and outside the United Nations system to develop effective legal and governance approaches to bio-terrorism and global health security? The article concludes that the globalization of public health threats like bio-terrorism requires globalized legal approaches.

  7. Collective Study On Security Threats In MANET

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2015-08-01

    Full Text Available In this paper the authors will be discussing the security issues in MANET amp the methods to protect it. Authors will be talk about related work in securing the network different type of attacks how to sense these sorts of attack what are the features of MANET then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested So that the users can use proper authentication techniques and network resources can be properly utilized.

  8. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  9. Oil and international security: old and new issues; Petrole et securite internationale: de nouveaux enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  10. Arms Transfer Policies and International Security: the Case of Brazilian-Swedish Co-operation

    Directory of Open Access Journals (Sweden)

    Carlos Federico Domínguez Avila

    Full Text Available Abstract This article discusses arms trade policies from an international security perspective. Arms transfers are widely treated as political issues even when economic incentives exist. They affect bilateral and multilateral relations among suppliers, countries receiving the arms, non-state actors, taxpayers, and victims. Following the agreement to build Swedish SAAB Gripen NG fighter jets in Brazil, more may be produced for sale to third countries. This, in turn, calls for a review of Brazil’s arms transfer policy. In this instance, Sweden’s principled arms sales model could serve as a basis for a revised Brazilian arms transfer policy as well.

  11. Security Implications of Virtualization: A Literature Study

    NARCIS (Netherlands)

    Cleeff, van André; Pieters, Wolter; Wieringa, Roel

    2009-01-01

    Server virtualization is a key technology for today's data centers, allowing dedicated hardware to be turned into resources that can be used on demand.However, in spite of its important role, the overall security impact of virtualization is not well understood.To remedy this situation, we have perfo

  12. International security, international political economy and S&T%国际安全、国际政治经济与科学技术

    Institute of Scientific and Technical Information of China (English)

    黄琪轩

    2011-01-01

    近年来,国际关系开始加强对科学与技术这一议题的关注.以往的文献主要有两条研究路径:国际安全领域的文献主要关注科学技术的变迁如何影响了国际关系;而国际政治经济学的研究主要关注国际关系的变化如何影响了科学技术.国际政治经济学的研究路径试图涉足多个学科聚焦的难题,使得国际关系能够占据新的研究领地.对这一议题的研究,国际政治经济学与国际安全、比较政治经济学以及美国政治经济学出现了交叉和合流.这些努力为未来的研究提供了新的机遇,也为跨学科的合作提供了新的前景.%In recent years, more and more scholars in International Relations pay attention to the issue of science and technology. The existing literatures have two approaches in studying of this. The first approach is from international security, it takes science and technology as independent variable and international politics as dependent variable; the second approach is from international political economy, it takes international political factors as independent variable and scientific and technological factors as dependent variable. The second approach is trying to occupy the commanding heights for international relations. In addition, International Political Economy,International Security, Comparative Political Economy and American Political Economy have more and more interactions and convergence in this issue ,which provides more opportunities for the future research.

  13. Experiment Study of Fiber Optic Sensing in Railway Security Monitoring

    Institute of Scientific and Technical Information of China (English)

    Dian Fan; De-Sheng Jiang; Wei-Lai Li

    2008-01-01

    Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through field experiment measuring the strain of the rail and analyzing the experiment data, the method of diagnosing the health condition of rail and wheel is investigated.

  14. International Conflict Studies as a Research and Teaching Area

    Directory of Open Access Journals (Sweden)

    Alexandra Viktorovna Khudaykulova

    2015-12-01

    Full Text Available The article analyzes international conflict studies as a science and an educational discipline. The analysis of the subject field and professional terminology adopted in this area both in Russian and in English is provided. Formation of international conflict studies as a distinct field of study in the United States and Western Europe is described. The results of analysis of 10 leading foreign schools on international conflict studies are presented. The main factors that were taken into account in identifying the leading centers were the existence of a separate research (educational analysis units of international conflicts, the world's leading scientific journals on conflict resolution, as well as databases for the analysis of international conflicts. The role of professional associations, education consortia and international organizations (UNESCO in the study of international conflicts is described. An analysis of the leading think tanks on defense and national security (as rated by Philadelphia think tank ranking is also provided. Particular attention is given to interdisciplinary research methodology of international conflicts and the structure of educational programs at leading schools in the world in international relations. The author summarizes the recommendations of the Association of Professional Schools of International Affairs (APSIA to create educational programs of this kind.

  15. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  16. Inner Security in Media from the perspective of social science and media studies

    Directory of Open Access Journals (Sweden)

    Oliver Bidlo

    2012-07-01

    Full Text Available Security and entertainment are moving closer together. The term Securitainment expresses in this context, the mediation of security through entertainment formats. This will open a new space for Internal Security, which includes its own actors and patterns of interpretation. This space is portrayed in the media and follows the logic of media for attention but is also part of the process of social control. The mass media are therefore an instance of the design of internal security, social control and an interpretation producer. Mass media become actors of the internal security. They provide a symbolic representation of security.

  17. A Study on Security Threats in Cloud

    Directory of Open Access Journals (Sweden)

    Na Jeyanthi

    2012-07-01

    Full Text Available Cloud computing is now invading almost all IT industry and has become a rich area of research. It enables the users to share the resources which are done through resource virtualization and they have to pay only for what they use. The new paradigm freed the organizations from the burden of installing and maintaining the expensive and critical software, platform and infrastructure. The only thing they need to see is the Internet enabled systems. As the number of dependents on the cloud services shoots up, the security issue has become an overwhelming problem for cloud service providers. In order to make use of the cloud benefits to full extent, these issues need to be addressed first. This paper presents the major security issues in cloud computing. Some of the countermeasures that can be implemented is also suggested.

  18. The fog problem in Central Asia - Deficiencies in international community research to support water and food security

    NARCIS (Netherlands)

    Froebrich, J.; Wegerich, K.

    2007-01-01

    Central Asian water planning following international policy recommendations and `blue prints¿ has caused more harm rather than benefiting local communities. International research has not been sufficient to contribute in practical terms to water and food security. This paper reflects potential facto

  19. AN ANALYTICAL STUDY AND SYNTHESIS ON WEB SERVER SECURITY

    Directory of Open Access Journals (Sweden)

    Jyoti Pandey

    2015-10-01

    Full Text Available Web servers are being as a viable means to access Internet-based applications. Latest Approaches to secure Web servers are not much efficient or robust enough to protect and their applications from hackers. There are several approaches and analogies to examine the minimum-security requirements of a system. But The Highly efficient Techniques approaches as Protection profile, a systematic approach Therefore, we derive the Web security components that make a secure Web server from the Web Server Protection Profile. Study of A component-based framework as well as an open source solution has been done subsequently in this paper We believe that after the studying of such a system (implemented and deployed later, it will function reliably and effectively. This work aims at establishing the provable reliability of construction and the feasibility of component-based solutions for the secure Web server. This paper gives a theoretical approach and analogy of Profiling a web server including All three basic security models together( System security, Transmission security & Access Control Systemetc.

  20. The Institute for Security Technology Studies (ISTS): overview

    Science.gov (United States)

    Kotz, David F.

    2004-09-01

    The Institute for Security Technology Studies (ISTS) was founded at Dartmouth College in 2000 as a national center of security research and development. The Institute conducts interdisciplinary research and development projects addressing the challenges of cyber and homeland security, to protect the integrity of the Internet, computer networks, and other interdependent information infrastructures. ISTS also develops technology for providing the information and tools necessary to assist communities and first responders with the evolving, complex security landscape. ISTS is a member of and administers the Institute for Information Infrastructure Protection (I3P), a consortium of 24 leading academic institutions, non-profits and federal laboratories that brings industry, academia and government together to articulate and focus on problems that need to be solved to help ensure the nation's information infrastructure is safe, secure, and robust.

  1. An Information Security Protection Model for International Business%一种国际业务信息安全防护模型

    Institute of Scientific and Technical Information of China (English)

    蒋诚智; 刘婷婷; 余勇

    2014-01-01

    企业国际化经营是进一步拓展发展空间与提升可持续发展能力的有效途径,国际业务及其信息化建设的发展同时也给企业信息安全提出了新的挑战。文中针对电网企业国际业务及其信息安全的特点,提出了一种国际业务信息安全防护模型。在分析电网企业国际业务安全风险的基础上,从安全防护模型的主站层、网络层和终端层三个层次研究了安全防护技术措施,并提出了安全管理思路及措施。%International business is an effective way for enterprises to extend their business areas and to enhance their sustainable develop-ment capability,while the development of international business and its informationization brings challenge to information security of en-terprises. In this paper,according to features of international business and information security in electric power grid companies,an infor-mation security model for international business is proposed. Based on security risk analysis,the security technical measures are studied from station level,network level and terminal level of the proposed model. Besides,the security management ideas and measures are also provided.

  2. Collective Study On Security Threats In VOIP Networks

    National Research Council Canada - National Science Library

    Muhammad Zulkifl Hasan; Muhammad Zunnurain Hussain

    2015-01-01

    The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors...

  3. 非对称与时变:中外证券市场波动性特征的比较研究%Asymmetry and Time-varying: the Comparative Study on Volatility Futures between Chinese and International Security Markets

    Institute of Scientific and Technical Information of China (English)

    周佰成; 吴若冰; 丁志国

    2011-01-01

    波动性是证券市场最为重要的特征之一,20世纪60年代以来人们开始进行系统性研究。传统的研究都是通过刻画单一证券市场历史波动来预测未来波动,这就要求这些波动要具备跨期稳定性。事实上,我们通过大量实证研究表明,证券市场的波动具有跨期时变特征,并表现出非对称性,而且随着世界经济的一体化发展趋势,各国证券市场波动之间具有日渐明显的关联效应。我们通过建立低频EGARCH-GED模型,从总体上印证了中国及美国、英国、日本等国际证券市场波动具有非对称性与时变特征,并进行了动态定量分析。最后从中国政策的影响、信息披露的完善、投资者的素质等角度定性分析了我国证券市场波动非对称性时变特征的形成过程。%Volatility is one of the most important characteristics of security market, which has attracted systematic research since 1960s. In order to forecast the volatility futures, traditional research is always based on modeling a single security market, which requests the volatility having the features of cross-term stability. In fact, the volatil- ity has time-varying features of cross-term and asymmetry by number of empirical studies. With the globalization of world economy, volatility spillovers of security markets among countries are becoming increasingly significant. Firstly, we have examined the overall asymmetry and time-varying features of the Chinese and international stock markets including United States, Japan and United Kingdom through the low-frequency EGARCH model. Moreover, we have made a dynamic quantitative analysis on volatility of the international security markets. Finally, these qualitative phenomena have been explained from such respects as the perspective of Chinese police, the improvement of information disclosure, the quality of investors and so on.

  4. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  5. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  6. Nuclear Cyber Security Case Study and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sunae [ChungNam National Univ., Daejeon (Korea, Republic of); Kim, Kyung doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  7. Securing Internet Protocol (IP) Storage: A Case Study

    CERN Document Server

    Somayaji, Siva Rama Krishnan; 10.5121/ijngn.2010.2102

    2010-01-01

    Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN) to be secure, each of these threats must be individually addressed. In this paper, we present a comparative study by implementing different security methods in IP Storage network.

  8. International cooperation for food and nutrition security: Systematization of the participatory, contextualized, and intersectoral educational practices

    Directory of Open Access Journals (Sweden)

    Luciene BURLANDY

    Full Text Available ABSTRACT The present study systematized the experience gained with the project Construindo capacidades em segurança alimentar e nutricional no Brasil, Canadá e Angola (2004-2010, Building food and nutrition security skills in Brazil, Canada, and Angola, whose objective was to qualify actions that promote food and nutrition security in the three countries using different educational practices. The activities were organized in the following subprojects: (a online distance learning courses; (b workshops to train managers, government technicians, representatives of civil society organizations, and social subjects who offered to act as a link between communities; and (c local pilot projects. The present study reports this experience. The educational practices implemented in the municipalities of Araçuaí (MG, Juazeiro (BA, and Fortaleza (CE were analyzed based on systematized information in the project reports and activity records (texts and photographs. The analytical reference was based on the concept of food and nutrition education, guided by the fundamentals of Popular Education and Paulo Freire; on the concept of food and nutrition security; and on the following analytical dimensions: participation, contextualization of educational practices, and intersectoriality. The results evidenced how educational practices contributed to the construction of shared concepts of food and nutrition security from an intersectoral and participatory perspective that values the peculiarities of diet in different socioeconomic and cultural contexts, and highlights daily situations and local traditions. They also expose the limits and potentialities of an experience of this magnitude, conducted from an interdisciplinarity perspective and using participatory methods.

  9. Assessing work disability for social security benefits: international models for the direct assessment of work capacity.

    Science.gov (United States)

    Geiger, Ben Baumberg; Garthwaite, Kayleigh; Warren, Jon; Bambra, Clare

    2017-08-25

    It has been argued that social security disability assessments should directly assess claimants' work capacity, rather than relying on proxies such as on functioning. However, there is little academic discussion of how such assessments could be conducted. The article presents an account of different models of direct disability assessments based on case studies of the Netherlands, Germany, Denmark, Norway, the United States of America, Canada, Australia, and New Zealand, utilising over 150 documents and 40 expert interviews. Three models of direct work disability assessments can be observed: (i) structured assessment, which measures the functional demands of jobs across the national economy and compares these to claimants' functional capacities; (ii) demonstrated assessment, which looks at claimants' actual experiences in the labour market and infers a lack of work capacity from the failure of a concerned rehabilitation attempt; and (iii) expert assessment, based on the judgement of skilled professionals. Direct disability assessment within social security is not just theoretically desirable, but can be implemented in practice. We have shown that there are three distinct ways that this can be done, each with different strengths and weaknesses. Further research is needed to clarify the costs, validity/legitimacy, and consequences of these different models. Implications for rehabilitation It has recently been argued that social security disability assessments should directly assess work capacity rather than simply assessing functioning - but we have no understanding about how this can be done in practice. Based on case studies of nine countries, we show that direct disability assessment can be implemented, and argue that there are three different ways of doing it. These are "demonstrated assessment" (using claimants' experiences in the labour market), "structured assessment" (matching functional requirements to workplace demands), and "expert assessment" (the

  10. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  11. The role and impact of the small states diplomacy on regional and international security

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Bejtush Gashi

    2016-07-01

    Full Text Available History has proved that the safety for small countries has never been secure, however this has been more emphasized during the Cold War Period through the rivalry of the superpowers, ideological conflicts, as well as the clashes between their geopolitical and geostrategic interests. For the Superpowers it is very easy to manipulate with these countries' economic and military aspect. They can't handle a conflict with their strengths, while the only way is diplomatic war to avoid or decrease the danger of conflict. To avoid insecurity, which for the small countries in the international relationships is bigger than for the big countries, the only safety alternative is their association in the international institutions. To face the regional and global challenges of safety, the Western Balkan countries have only one strategic solution, that is the integration in the Euro-Atlantic structures. The membership institutionalizes the relations between the small countries with those regional in the economic and safety field, as well as it sets the frames of the behavior with which the weak are protected from the eventual misuse from the most powerful ones. Small countries should concentrate in the creation of the professional and trained forces which can be easily mobilized in case of any crisis and they should also be affordable in the economic aspect.

  12. A study of zoning for energy security in China

    Institute of Scientific and Technical Information of China (English)

    Guo Yiqiang; Ge Quansheng; Zheng Jingyun

    2008-01-01

    As a result of more and more serious energy risks, the study of national energy security zoning is not only the basic requirement of energy risk management but also the new demand of economic development for the energy industry. Firstly, this paper analyzes the basic situation of energy resources and production and consumption of pri-mary energy from 1996 to 2005 in China. Secondly, this paper founds an Energy Security Index System formed by six indices including the percentage of energy reserves, intertocal dependent degree, energy elcsticity coefficient and so on. It subsequently calculates the weight of these indices with the factor analysis rating method. Lastly, the paper evaluates and zones the abilities of energy security of 30 provinces in China with the grey cluster method. According to their security, the 30 provinces are classified into three diferent levels: high, medium, and low levels. The regions at low energy security level include Beijing, Shanghai, Zhejiang, Fujian, Guangdong, Guangxi and Hainan. They are mainly littoral and short of primary energy production while mostly dependent on other provinces. Those at medium energy security level include 15 provinces (cities or districts), such as Liaoning, Tianjin, Hebei, Shandong, Henan, Hunan and so on. These provinces are in the northeast, north, east of and central China. Those at high energy secu- rity level contain Shanxi, Inner Mongolia, Heilongiiang, Jilin, Chongqing, Sichuan, Shaanxi, Xinjiang. These prov-inces are the main primary energy production bases.

  13. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    security procedures, encouraging their followers to attack the global transportation system.15 The consequences of these attacks are not just the visual ...partnerships for DHS.31 Though this argument is sound , the author only reviews a few programs, and does not acknowledge the broader DHS capability nor its...Capacity Development,”2. 89 Neil A. Englehart, “State Capacity, State Failure, and Human Rights,” Journal of Peace Research 46, no. 2 (2009): 163

  14. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  15. (REBUILDING THE EUROPEAN UNION`S INTERNATIONAL ROLE THROUGH HUMAN SECURITY STRATEGY IN THE AFTREMATHS OF THE EUROPEAN CRISIS

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2014-10-01

    Full Text Available In a globalized world, characterized by profound shifts in the dynamics of global power and by diverse threats to peace and security, the European Union should be an active and peace-promoter actor, according to its founding principles. Thus, the European crisis left hard to heal scars within the European Union internal coherence and for its international role and image. The European crisis determined a cleavage in foreign and defence policy between the EU`s member states, creating dissonances in its internal processes. Therefore, this incongruence determined flawed reactions to international events. In order to determine the impact of the European crisis on the EU`s international role, it is briefly analysed the EU`s and its member states reactions to the conflicts from Libya and Syria. The main hypothesis of this article is that in order to overcome the effects of the economic crisis and to rebuild its international trust, the EU should reaffirm its core principles through a coherent external policy, which should be embedded in a bottom-up legitimized paradigm. This analysis demonstrates that human security strategy and the responsibility to protect principle can become the new European meta-narrative, the fact that they have the potential to overcome the current gap between rhetoric and practice in foreign and defence European policies. Therefore, this article advocates that the human security strategy and the responsibility to protect principle represent an impetus to transform the EU in an important global actor.

  16. Crime organizado, estado e segurança internacional Organized crime, the state and international security

    Directory of Open Access Journals (Sweden)

    Marco Cepik

    2011-12-01

    Full Text Available O presente artigo versa sobre o crime organizado internacional, buscando debater seus atributos conceituais e avaliá-lo do ponto de vista da segurança internacional. O problema norteador do trabalho é compreender o fundamento e as consequências da interação entre autoridade política e crime organizado, analisando, de um lado, as implicações da criminalidade organizada para a soberania e, de outro, as ações governamentais e internacionais para controlar essas organizações. Nesse sentido, argumentamos que as capacidades de poder acumuladas pelo crime, na medida em que o próprio processo de consolidação do Estado impede que as organizações criminosas possam almejar substituírem o Estado, são funcionais ao seu objetivo primário de enriquecimento ilícito. O desenvolvimento do crime organizado não é exógeno à vida em sociedade ou patológico, e sim parte constituinte da estrutura social, mantendo uma relação parasitária com a ordem estabelecida. Como o crime organizado tem implicações negativas sobre a capacidade de o Estado prover segurança e bem-estar para a sociedade, debatemos as ações policiais, judiciárias e de inteligência a que recorrem os governos como meio para controlar as organizações criminosas. No âmbito internacional, verifica-se que há cooperação multilateral e bilateral na matéria, mas que essa agenda não configura um ambiente de cooperação irrestrita, visto que, assim como internamente, há interesses divergentes e assimetria na distribuição dos custos e dos benefícios da ação conjunta.The present article analyzes international organized crime as an international security problem. Its main purpose is to comprehend the rationale and the consequences of the interaction between political authority and organized crime, analyzing the implications of organized crime for sovereignty as well as domestic and international measures to control such organizations. The central argument is that

  17. Asthma severity, child security, and child internalizing: using story stem techniques to assess the meaning children give to family and disease-specific events.

    Science.gov (United States)

    Winter, Marcia A; Fiese, Barbara H; Spagnola, Mary; Anbar, Ran D

    2011-12-01

    Children with persistent asthma are at increased risk for mental health problems. Although mechanisms of effect are not yet known, it may be that children are less trusting of the family as a source of support and security when they have more severe asthma. This study tested whether asthma severity is related to children's perceptions of insecurity in the family, and whether insecurity is in turn associated with child adjustment. Children (N = 168; mean age = 8 years) completed story stems pertaining to routine family events (e.g., mealtimes) and ambiguous but potentially threatening asthma events such as tightness in the chest. Responses were evaluated for the extent to which appraisals portrayed the family as responding in cohesive, security-provoking ways. Asthma severity was assessed by both objective lung function testing and primary caregiver report. Caregivers reported child symptomatology. Beyond medication adherence, caregiver education, and child age and gender, greater asthma severity predicted more internalizing and externalizing symptoms. Greater asthma severity, assessed using spirometry (but not parent report), was related to less secure child narratives of the family, which in turn related to more child internalizing symptoms. Results suggest that asthma can take a considerable toll on children's feelings of security and mental health. Furthermore, given the difficulty in assessing young children's perceptions, this study helps demonstrate the potential of story stem techniques in assessing children's appraisals of illness threat and management in the family.

  18. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  19. Developing International Business Managers through International Study Visits to China

    Science.gov (United States)

    Tang, Yiming; Rose, Susan

    2014-01-01

    Globalization is a key factor in the success of business organizations today, impacting many aspects of management performance. Understanding the global business environment has therefore become a key objective in the teaching of international business on Executive MBA programs. Drawing on the theory of experiential learning, this study examines…

  20. Developing International Business Managers through International Study Visits to China

    Science.gov (United States)

    Tang, Yiming; Rose, Susan

    2014-01-01

    Globalization is a key factor in the success of business organizations today, impacting many aspects of management performance. Understanding the global business environment has therefore become a key objective in the teaching of international business on Executive MBA programs. Drawing on the theory of experiential learning, this study examines…

  1. Deployment of a highly secure clinical data repository in an insecure international environment.

    Science.gov (United States)

    Feldman, Henry; Reti, Shane; Kaldany, Eli; Safran, Charles

    2010-01-01

    We have designed and deployed a novel approach to protecting Personal Healthcare Information in environments where a data center is remote and its physical security cannot be assured. Our "KeyServer" methodology uses a server-client-server architecture to dynamically serve keys from a distant server in a separate secure data center in the US. The approach combines pre-existing and novel techniques into a layered protective barrier around compromise of patient data. We describe how this technology provides scalable security that makes security breaches highly unlikely. With some careful planning a Clinical Data Repositories fed by Electronic Health Records can be placed in relatively insecure settings, with a high-level of security surrounding data theft, even in the event of hardware theft. Such security architecture is ideal for not only developing nations, but for the evolution of health information to cloud computing platforms.

  2. American Security and the International Energy Situation. Volume 1. Introduction and Summary

    Science.gov (United States)

    1975-04-15

    Financial Security 28 Timely Energy Supply Enhancement 31 Prospects for a Price Break M Concluding Remarks ’♦S II. World Energy Interdependence...Security Implications of Energy (July 197’» Workshop) Bibliography Iv HI-2239-RR VOLUME H: WORLD ENERGY INTERDEPENDENCE AND THE SECURITY OF SUPPLY...DEPENDABILITY, 1975-1985 Vl The Outlook for World Energy Interdependence. Supply, Demand, OPEC and Prices Energy Interdependence and the Vulnerability of

  3. Remodeling: A Way to Strengthen the Department of Homeland Security Internal Management and Partnering Capability

    Science.gov (United States)

    2013-05-24

    Future of Homeland Security,” FDCH Congressional Testimony (July 12, 2012): Military & Government Collection, EBSCOhost , 2, (accessed July 31, 2012...Government Collection, EBSCOhost , 1, (accessed July 31, 2012). 12 U.S. Department of Homeland Security, Department of Homeland Security Strategic Plan...Department’s Roles/Missions,” FDCH Political Transcripts (n.d.): Military & Government Collection, EBSCOhost , 8, (accessed July 31, 2012). 14 Don Harvey and

  4. Future consumer mobile phone security: a case study using the data centric security model

    NARCIS (Netherlands)

    Cleeff, van Andre

    2008-01-01

    In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested, most

  5. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    Cleeff, van A.

    2008-01-01

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  6. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  7. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    2008-01-01

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  8. Biosafety and biosecurity as essential pillars of international health security and cross-cutting elements of biological nonproliferation

    Directory of Open Access Journals (Sweden)

    Perkins Dana

    2010-12-01

    Full Text Available Abstract The critical aspects of biosafety, biosecurity, and biocontainment have been in the spotlight in recent years. There have also been increased international efforts to improve awareness of modern practices and concerns with regard to the safe pursuit of life sciences research, and to optimize current oversight frameworks, thereby resulting in decreased risk of terrorist/malevolent acquisition of deadly pathogens or accidental release of a biological agent, and increased safety of laboratory workers. Our purpose is to highlight how the World Health Organization’s (WHO revised International Health Regulations (IHR[2005], the Biological Weapons Convention (BWC, and the United Nations Security Council Resolution (UNSCR 1540 overlap in their requirements with regard to biosafety and biosecurity in order to improve the understanding of practitioners and policymakers and maximize the use of national resources employed to comply with internationally-mandated requirements. The broad range of goals of these international instruments, which are linked by the common thread of biosafety and biosecurity, highlight their significance as essential pillars of international health security and cross-cutting elements of biological nonproliferation. The current efforts of the Republic of Georgia to enhance biosafety and biosecurity in accordance with these international instruments are summarized.

  9. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was

  10. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  11. Information security culture.

    OpenAIRE

    2008-01-01

    The current study originated from the realisation that information security is no longer solely dependent on technology. Information security breaches are often caused by users, most of the time internal to the organisation, who compromise the technology-driven solutions. This interaction between people and the information systems is seemingly the weakest link in information security. A people-oriented approach is needed to address this problem. Incorporating the human element into informatio...

  12. Cultural Diversity, Relocation, and the Security of International Students at an Internationalised University

    Science.gov (United States)

    Forbes-Mewett, Helen; Nyland, Chris

    2008-01-01

    The notion of "security" is an elusive concept that attracts varying interpretations. In this article, the authors adopt a definition that views security as a broadly applicable term that encompasses physical, social, and economic dimensions that relate to human rights, cultural difference, and relocation. The approach embraces the…

  13. 76 FR 5225 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2011-01-28

    ... Holdings Board of Directors. Ballista Securities LLC (``Ballista Securities''), a wholly-owned subsidiary... affiliated with one of its members, and (2) the potential for informational advantages that could place an affiliated member of an exchange at a competitive advantage vis- -vis the other non- affiliated members,...

  14. 77 FR 74700 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-12-17

    ... its rules to increase position and exercise limits for options on the iShares MSCI Emerging Markets... securities.\\5\\ EEM tracks the performance of the MSCI Emerging Markets Index, which has approximately 800 component securities.\\6\\ ``The MSCI Emerging Markets Index is a free float-adjusted market...

  15. Performance Analysis of Internal vs. External Security Mechanism in Web Applications

    Directory of Open Access Journals (Sweden)

    Supriya Gupta

    2010-03-01

    Full Text Available Most of the applications now -a-days are developed web based. The applications of public access are highly exposed to security threats. The increasing number of web based attacks which result in loss of data and unauthorized access to application has drawn the attention of organizations toward web application security. The most commonly employed defense mechanism is to use solutions that rely on security service tools like firewalls, intrusion detection and prevention systems etc. Most of the commonly used tools such as SNORT are based upon the payload inspection that detects an attack by searching for the occurrence of known signature patterns in the packet. But using these devices for protecting web applications against common input based attacks is an inefficient process. It consumes a significant amount of time, memory and CPU cycles for each packet while scanning through a list of rules. Implementing security features within applications’ logic is an effective alternative. In this paper we analyz ed the performance of two experimental web applications, one with security implemented within the code and the other checked by external security system called SNORT using a web application testing tool (WAPT 3.0. Our experiment showed that the application with secure code showed better performance statistics in terms of response time. The paper also discusses various issues regarding the use of security devices as protection against application layer attacks.

  16. Sourcing of internal auditing : An empirical study

    NARCIS (Netherlands)

    Speklé, R.F.; Elten, van H.J.; Kruis, A.

    2007-01-01

    This paper studies the factors associated with organizations’ internal audit sourcing decisions, building from a previous study by Widener and Selto (henceforth W&S) [Widener, S.K., Selto, F.H., 1999. Management control systems and boundaries of the firm: why do firms outsource internal audit activi

  17. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  18. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  19. The Quest for Sustainable Security

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Since the beginning of the 21st century,non-tra-ditional security problems have become significant threats to world peace.These include economic,financial and information security,terrorism,drug trafficking,transnational crime and infectious dis-eases.In this article for Beijing Review,Liu Jiangyong,a professor with Tsinghua University’s Institute of International Studies,introduces a new security concept-"sustainable security." In his view,as traditional and non-traditional security threats become interwoven,the concept is gaining prominence on international agendas.Edited excerpts follow

  20. Secure software practices among Malaysian software practitioners: An exploratory study

    Science.gov (United States)

    Mohamed, Shafinah Farvin Packeer; Baharom, Fauziah; Deraman, Aziz; Yahya, Jamaiah; Mohd, Haslina

    2016-08-01

    Secure software practices is increasingly gaining much importance among software practitioners and researchers due to the rise of computer crimes in the software industry. It has become as one of the determinant factors for producing high quality software. Even though its importance has been revealed, its current practice in the software industry is still scarce, particularly in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collection purpose whilst statistical methods such as frequency, mean, and cross tabulation are used for data analysis. Outcomes from this study reveal that software practitioners are becoming increasingly aware on the importance of secure software practices, however, they lack of appropriate implementation, which could affect the quality of produced software.

  1. TO STUDY THE PREVALENCE OF MUSCULOSKELETAL DISORDERS IN SECURITY GUARDS

    Directory of Open Access Journals (Sweden)

    Sandeep Kaur

    2015-12-01

    Full Text Available Background: The prevalence of musculoskeletal disorders has increased markedly with promotion of industrial life. It is one of the causes of absenteeism of employees from their work and significantly affecting their quality of life. The prevalence is not known in profession such as security guards, whose occupation comprises of prolonged standing mainly. Methods: A cross sectional survey was administered to 100 security guards in Guru Gobind Singh Super Thermal plant, Ropar, Punjab, India, using a self-structured questionnaire. Results: 100 security guards included in the study were in the age group of 30-50 years. 58% of the guards were alcoholic while only 19% were smokers. Out of 100 respondents, 68% had complained of MSDs in different areas while 32% did not complain of any musculoskeletal discomfort. Out of 68 security guards who had MSDs, majority of the guards had back pain42.6% . Higher prevalence of MSDs, 97.1% (33/34 had been found in 46-50 years of age, followed by age group of 41-45 years where the prevalence was 76.2%(16/21.The most common risk factor in our study identified was opening the gate again and again (98.5% which could be due to the nature of their duty. Most common used coping strategy (69.9% was to change from standing to sitting position when MSDs aggravates. Conclusion: It can be concluded that there is significant (68% prevalence of MSDs in security guards. Demographic variables such as age, smoking and alcohol consumption have been found out to be contributing risk factors.

  2. International Journal of Humanistic Studies

    African Journals Online (AJOL)

    Contributions are accepted from the fields of Philosophy, English Language, Literature, ... Library Studies, Information Science, Cultural Studies, Sociology and other ... Translating policy in the teaching of history: curriculumas a product of an ...

  3. Battle for Ulster. A Study of Internal Security

    Science.gov (United States)

    1987-06-01

    considerable economic -benefits as British citizens, are not even fully committed- to reunification. Yet their increased- electoral support for Sinn Fein may...Socialist Republic. Consistent with- this new political, orientation, the IRA broke the long tradition of " abstentionism ," backing the candidacy...gained dramatically in electoral strength among- the Catholic community at the expense of the more moderate SDLP. 92 This shift by-the Provisionals to a

  4. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  5. 76 FR 56832 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-09-14

    ... and the underlying security's price, which affects the theoretical price of an option. The risk... Street, NE., Washington, DC 20549 on official business days between the hours of 10 a.m. and 3 p.m...

  6. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  7. Human Rights, Human Needs, Human Development, Human Security - Relationships between four international human discourses.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    markdownabstractAbstract: Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and

  8. 77 FR 37947 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-06-25

    ... Foreign Currency Options June 19, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of... is proposing to extend for an additional year the fee discount for large-sized foreign currency...

  9. The DISAM Journal of International Security Assistance Management. Volume 23, Number 3, Summer 2001

    Science.gov (United States)

    2001-01-01

    Center “U.S. Air Force Electronic Systems” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Pauline Froebel , Mark...Traffic Operations/Mobility Command and Control Foreign Military Sales: Supporting Our Nation’s Security Strategy By Pauline Froebel , Mark Stevens

  10. 78 FR 17729 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-22

    ... securities: SPDR S&P 500 ETF (``SPY''), Apple Inc. (``AAPL''), SPDR Gold Trust (``GLD''), Google Inc. (``GOOG... ISE Rule 715(j). ] The Exchange now proposes to adopt new Supplementary Material .13(d) to Rule 504...

  11. 75 FR 6782 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Order...

    Science.gov (United States)

    2010-02-10

    ... TCV figures. For example, 1% of the average TCV for January 2010 (8.9 billion) was approximately 89... can include placing hidden orders. In SR-ISE-2009-108, for securities priced less than $1,...

  12. 75 FR 6743 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Order...

    Science.gov (United States)

    2010-02-10

    ... figures. For example, 1% of the average TCV for January 2010 (8.9 billion) was approximately 89 million... can include placing hidden orders. In SR-ISE-2009-108, for securities priced less than $1,...

  13. The Securization of the HIV/AIDS Epidemic as a Norm: A Contribution to Construtivist Scholarship on the Emergence and Diffusion of International Norms

    Directory of Open Access Journals (Sweden)

    Marco Antonio Vieira

    2007-03-01

    Full Text Available This article discusses the emergence in the late 1990s of an innovative conceptualization of security that proclaims the global HIV/AIDS epidemic a threat to international peace and stability. The study provides a framework for understanding the securitization of the HIV/AIDS epidemic as an international norm defined and promoted mainly by multilateral bodies, powerful states in the North and transnational HIV/AIDS advocacy networks. The HIV/AIDS securitization norm (HASN is an attempt of the present analysis to synthesize under a single analytical concept the myriad of ideas and international prescriptions about HIV/AIDS interventions. The article identifies the actors who developed the main strategic prescriptions of the HASN and the transnational mechanisms that promoted the diffusion of its concepts throughout the state system.

  14. CASP CompTIA Advanced Security Practitioner Study Guide Exam CAS-001

    CERN Document Server

    Gregg, Michael

    2012-01-01

    Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that as

  15. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  16. The Study and Perspective of Mobile Agent Security

    Institute of Scientific and Technical Information of China (English)

    MU Hong; WANG Ru-chuan; WANG Hai-yan

    2004-01-01

    Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. So many projects have focused on the security issues of mobile agent and many mechanisms have been proposed to solve the security problem. This paper discusses the security issues and the countermeasures. Then it points out some directions for the research of the mobile agent security.

  17. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  18. Internal Audit of Social Security Funds of Enterprise%企业社保资金内部审计

    Institute of Scientific and Technical Information of China (English)

    谢玲琳

    2014-01-01

    The social security fund management within the enterprise relates to the individual vital inter-ests of workers, but also is the focus of attention, which is more clearly reflected in state-owned enterpri-ses.So the internal audit of enterprise is increasingly concerned about the social security fund manage-ment of enterprises.In this paper, combined with the practice, the internal audit of the social security funds of state-owned enterprises is discussed.%社保资金管理在企业内部,关系到职工个人的切身利益,也是人们关注的焦点,这在国有企业体现得更为明显。因此,企业内部审计也越来越关注企业社保资金管理。文章结合实践,重点就国有企业开展社保资金内部审计进行探讨。

  19. China's Approach to International Development: A Study of Southeast Asia

    Directory of Open Access Journals (Sweden)

    Neil Renwick

    2015-12-01

    Full Text Available China is establishing itself as a new international aid donor. This study explains China's emerging approach to international development assistance. The paper addresses the question of how far China's understanding of "development" is an appropriate basis for genuinely "win-win" relationships? The paper explores this question by examining China's relationship with Southeast Asia. China is re-emphasising its commitment and partnership credentials with neighbouring states, some of whom have many people living in poverty and as countries are in need of development assistance. The paper identifies key facets of China's approach to international development, examines economic, political and strategic factors underpinning China's approach in Southeast Asia. Adopting a Human Security perspective, it assesses China's development contribution with reference to Cambodia, Laos and Myanmar and highlights popular opposition. The study finds that Chinese trade and investment are making a significant contribution to the region's economic growth. However, the analysis identifies two problems in China's approach, an over-reliance on the level of state-to-state relations and too narrow a domain of engagement centred upon economic cooperation. China needs to incorporate a societal engagement strategy highlighting transparency and accountability of Chinese corporate behaviour. It also needs to re-balance its approach by emphasising human capital capability and capacity-building across the non-economic social and cultural domains. China's approach to international development is a rapid learning process and is emerging, but still has further to go.

  20. International New Venture Legitimation: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Romeo V. Turcan

    2013-11-01

    Full Text Available There is limited theoretical understanding and empirical evidence for how international new ventures legitimate. Drawing from legitimation theory, this study fills in this gap by exploring how international new ventures legitimate and strive for survival in the face of critical events during the process of their emergence. It is a longitudinal, multiple-case study research that employs critical incident technique for data collection, analysis, and interpretation. Following theory driven sampling, five international new ventures were selected that were operating in the software sector in the UK, and had internationalized and struggled for survival during the dotcom era. Grounded in data, this study corroborates a number of legitimation strategies yielded by prior research and refutes others. It further contributes to our understanding of international new venture legitimation by suggesting new types of legitimation strategies: technology, operating, and anchoring. Studying international new ventures through theoretical lenses of legitimation is a promising area of research that would contribute to the advancement of international entrepreneurship theory.

  1. Discalced Carmelites as Focus of Attention of Polish People’s Republic Security Force in Cracow Voivodship in the Light of Preserved Reports Sent to Ministry of Public Security and Ministry of Internal Affairs in the Years 1947-1970

    Directory of Open Access Journals (Sweden)

    Józef Marecki

    2004-12-01

    Full Text Available In the times of the Polish People’s Republic, national security issues and, at the same time, surveillance of the society and suppression of many institutions – the Catholic Church included - were in the hands of appropriate services, modelled on the Soviet NKVD. At first this was the Ministry of Public Security and since 1956 the Security Police. The first part of the article presents the organization of security units in the voivodship of Cracow and the distribution of monastic communities, while the second throws light on the activities of these units uh the basis of preserved reports sent from Cracow to the Ministry of Public Security and the Ministry of Internal Affairs. Officials of the Security Police who worked in the voivodship and district departments took a close interest in the Discalced Carmelite monks, taking account of their wartime past, pastoral activity and connections with the Church hierarchy. To ensure influence upon the life of the Discalced Carmelite Province as well as access to information on monastic internal issues they gained several secret collaborators within the congregation itself and its lay associates. The article is the first attempt at showing the methods of the Security Police (SB and the Security Office (UB activities directed at monastic orders; methods aiming at subjugating to the authorities not only the orders themselves, but the whole Catholic Church in Poland.

  2. 76 FR 47630 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-05

    ... continually to improve its platform data offerings and to cater to customers' data needs. For example, ISE has... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE... same data that is displayed on the OPRA feed. Top Quote shows bid/ask quote size for Customer and...

  3. 78 FR 21677 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-11

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE... their products to all customers, whether members or non- members, so as to broaden distribution and grow... between trading platforms that provide transaction execution and routing services and proprietary data...

  4. 76 FR 70178 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-11-10

    ... continually to improve its platform data offerings and to cater to customers' data needs. For example, ISE has... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE... maximize the appeal of their products to all customers, whether members or nonmembers, so as to broaden...

  5. 75 FR 50015 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-08-16

    ...,'' liquidity from the Exchange in the following options classes: PowerShares QQQ trust (``QQQQ''), Bank of... Liquidity August 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... proposing to amend its transaction fees and rebates for adding and removing liquidity. The text of...

  6. 78 FR 36625 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-06-18

    ... to and perfect the mechanism of a free and open market and a national market system because it would... national securities exchange on December 3, 2012 \\3\\ and commenced trading operations on December 7, 2012.... Pursuant to Rule 516(e), an Attributable Order is a market or limit order which displays the user firm...

  7. 78 FR 13107 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-02-26

    ... in securities, to remove impediments to and perfect the mechanisms of a free and open market and a... opening obligations on their market makers, and will allow LMMs to focus on aspects of their operations... Immediate Effectiveness of a Proposed Rule Change To Revise Market Maker Obligations Regarding the...

  8. 78 FR 16726 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2013-03-18

    ... overlying NMS Stocks. Because options pricing models are highly dependent on the price of the underlying... security.\\10\\ This uncertainty will be factored into the options pricing models of market professionals... definition of what the ``theoretical value'' should be for an option when the underlying NMS stock has...

  9. 77 FR 16290 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-03-20

    ... with the Telemarketing Consumer Fraud and Abuse Prevention Act of 1994 (``Prevention Act'').\\4\\ The... Fraud and Abuse Prevention Act; Determination that No Additional Rulemaking Required, Securities... a mutual fund or variable insurance product issuer. See proposed Rule 626(n)(1), (4), and (12); see...

  10. 77 FR 38100 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Instituting...

    Science.gov (United States)

    2012-06-26

    ... Index would be subject to, among others, Exchange rules governing margin requirements and trading halt... the same marketing process it follows for all of its other new products, which is designed to promote... CBOE's indexes that measure the spot yield of individual U.S. Treasury Securities by simply...

  11. 75 FR 80091 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Science.gov (United States)

    2010-12-21

    ... or approved in accordance with the standards of training, experience, competence, and other... have a floor, for consistency with other SRO rules, the Exchange also proposes to delete language that... training, experience and competence as prescribed by the rules of the national securities exchange....

  12. 76 FR 12778 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-03-08

    ... exchanges that trade like products, in this case, the World Currency Options traded on NASDAQ OMX PHLX, Inc... Currency Options March 2, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the... The ISE is proposing to amend its incentive plan for market makers in foreign currency...

  13. The International Test Commission Guidelines on the Security of Tests, Examinations, and Other Assessments

    Science.gov (United States)

    International Journal of Testing, 2016

    2016-01-01

    The amount and severity of security threats have increased considerably over the past two decades, calling into question the validity of assessments administered around the world. These threats have increased for a number of reasons, including the popular use of computerized and online technologies for test administration and the use of almost…

  14. 75 FR 26830 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-05-12

    ... Liquidity May 6, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and... Exchange's current schedule of transaction fees and rebates for adding and removing liquidity; and (ii.... Purpose The Exchange proposes to increase liquidity and attract order flow by amending its...

  15. 76 FR 22425 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-04-21

    ... Liquidity April 15, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act... proposing to amend its transaction fees and rebates for adding and removing liquidity. The text of the... to market participants that add or remove liquidity from the Exchange (``maker/taker fees'') in...

  16. 76 FR 47279 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-08-04

    ... Liquidity July 29, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... its transaction fees and rebates for adding and removing liquidity. The text of the proposed rule... to market participants that add or remove liquidity from the Exchange (``maker/taker fees'') in...

  17. 75 FR 19449 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-04-14

    ... Liquidity April 7, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1... would apply to transactions that take and remove liquidity in the above symbols. The Exchange also... proposed rule change is to increase liquidity and attract order flow in QQQQ, BAC and C options on...

  18. 75 FR 70059 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-11-16

    ... Liquidity November 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act... proposing to amend its transaction fees and rebates for adding and removing liquidity. The text of the... to market participants that add or remove liquidity from the Exchange (``maker/taker fees'') in...

  19. 75 FR 78288 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-12-15

    ... Liquidity December 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act... is proposing to amend its transaction fees and rebates for adding and removing liquidity. The text of... transaction charge to market participants that add or remove liquidity from the Exchange (``maker/taker...

  20. 76 FR 21934 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2011-04-19

    ... Liquidity April 13, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act... is proposing to amend its transaction fees and rebates for adding and removing liquidity. The text of... transaction charge to market participants that add or remove liquidity from the Exchange (``maker/taker...

  1. 78 FR 24271 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-24

    ... best and single worst overall quoting days each month, on a per symbol basis, is excluded in... Exchange currently offers a $0.10 per contract rebate to Market Makers if the quotes they send to the... not a broker/dealer in securities, and does not place more than 390 orders in listed options per...

  2. 78 FR 24265 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-04-24

    ... Market Maker's single best and single worst overall quoting days each month, on a per symbol basis, is... options.\\3\\ \\3\\ See Securities Exchange Act Release No. 69270 (April 2, 2013), 78 FR 20988 (April 8, 2013... if the quotes they send to the Exchange qualify the Market Maker to become a Market Maker Plus....

  3. 77 FR 31680 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2012-05-29

    ... exclude from the NBBO calculation a Market Maker's single best and single worst overall quoting days in a... broker/dealer in securities, and does not place more than 390 orders in listed options per day on average... quotes they sent to the Exchange qualify the Market Maker to become a Market Maker Plus.\\8\\ A...

  4. 78 FR 61416 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-10-03

    ... the provisions of Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4... believes that this amendment will prevent any confusion on the part of its members on how such orders will... the amendment to Rule 503(f)(3) discussed above, will prevent any confusion on the part of its...

  5. 75 FR 25897 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2010-05-10

    ... stopped buy order, lower than the national Best Bid in the options series at the time of execution, or... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE... Orders (a) no change. (b) Limit Orders. A limit order is an order to buy or sell a stated number...

  6. 78 FR 25502 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-05-01

    ... iShares MSCI Emerging Markets Index Fund April 25, 2013. Pursuant to Section 19(b)(1) of the... for options on iShares MSCI Emerging Markets Index Fund (``EEM''). The text of the proposed rule... Emerging Markets Index, which has approximately 800 component securities, is a free float-adjusted...

  7. 78 FR 17970 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-25

    ... potential product users and they have indicated a preference that premium pricing for mini-options match... addition to giving market participants clarity as to the minimum pricing increments for mini-options, the filing would harmonize penny pricing between mini-options and standard options on the same security. \\3...

  8. Human Rights, Human Needs, Human Development, Human Security : Relationships between four international 'human' discourses

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    textabstractHuman rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each

  9. Institutionalization of Information Security: Case of the Indonesian Banking Sector

    Science.gov (United States)

    Nasution, Muhamad Faisal Fariduddin Attar

    2012-01-01

    This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information…

  10. The Internal and External Dimensions of Security in the Himalayas -From non-alignment to multi-alignment

    DEFF Research Database (Denmark)

    Schmidt, Johannes Dragsbæk; Thapa, Manish

    This contribution offers a critical perspective of the internal and external dimensions of security and conflicts in the Himalayas. The two main actors are India and China while Pakistan plays a role in the Kashmir conflict. With the recent rapprochement between the BJP-government led by Narendra...... Modi and the Communist party led by Xi Jinping the two countries are attempting to keep a global and regional geo-economic momentum while the US appears to be more inclined to return to a more traditional geo-political state of affairs....

  11. Disaster at a University: A Case Study in Information Security

    Science.gov (United States)

    Ayyagari, Ramakrishna; Tyks, Jonathan

    2012-01-01

    Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…

  12. The Glioma International Case-Control Study

    DEFF Research Database (Denmark)

    Amirian, E. Susan; Armstrong, Georgina N; Zhou, Renke

    2016-01-01

    Decades of research have established only a few etiological factors for glioma, which is a rare and highly fatal brain cancer. Common methodological challenges among glioma studies include small sample sizes, heterogeneity of tumor subtypes, and retrospective exposure assessment. Here, we briefly...... describe the Glioma International Case-Control (GICC) Study (recruitment, 2010-2013), a study being conducted by the Genetic Epidemiology of Glioma International Consortium that integrates data from multiple data collection sites, uses a common protocol and questionnaire, and includes biospecimen...

  13. CompTIA Security+ Study Guide Exam SY0-301

    CERN Document Server

    Dulaney, Emmett

    2011-01-01

    The preparation you need for the new CompTIA Security+ exam SY0-301 This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam topics such as general security concepts, infrastructure security, the basics of cryptography, and much more. Provides 100% coverage of all exam objectives for the new CompTIA Security+ exam

  14. “A STUDY ON SECURE SHELL (SSH PROTOCOL”

    Directory of Open Access Journals (Sweden)

    NIDHI KANDHIL

    2011-08-01

    Full Text Available Secure Shell (SSH provides an open protocol for securing network communications that is less complex and expensive than hardware-based VPN solutions. Secure Shell client/server solutions provide command shell, file transfer, and data tunneling services for TCP/IP applications. SSH connections provide highly secure authentication, encryption, and data integrity to combat password theft and other security threats. VanDyke Software® clients and servers are mature native Windows implementations that offer a range of SSH apabilities and are interoperable with SSH software on other platforms.

  15. The International Criminal Court as a Component of U.S. National Security Strategy

    Science.gov (United States)

    2012-04-21

    international character .33 After years of negotiations, 148 nations came together in 1998 to hammer out the final details about...critic of the ICC, while accurate in his comparison between the two systems, misses the larger picture. No international tribunal, not even Nuremberg

  16. The DISAM Journal of International Security Assistance Management. Volume 30, Number 4, December 2008

    Science.gov (United States)

    2008-12-01

    and journalists, labor leaders and democratic reformers who want to visit America. We will continue to support Russia’s fight against HIV/AIDS and...Recreacion Derecho de la Poblacion during the humanitarian/ civic assistance mission Continuing Promise (CP) 2008. Kearsarge is the primary platform... labor in non-combat areas. With DoD’s renewed request in 2008 to expand Section 1206 to allow training of foreign police and related security forces

  17. Assessing the Parameters for Determining Mission Accomplishment of the Philippine Marine Corps in Internal Security Operations

    Science.gov (United States)

    2009-01-01

    of the MILF attacked innocent civilian communities in Lanao del Norte , North Cotabato, and Sarangani in August 2008 to protest of the non-signing of...Abu Sayyaf spokesman Abu Sabaya and his group aboard local watercraft off Barangay Panganuran, Sibuco, Zamboanga Del Norte in June 21, 2002.46 As the...Asia Africa Intelligence Wire, "Filipino Defense Chief: Communist Remain Biggest Threat to National Security," The Philippine Star, October 5,2007

  18. International trade, regional integration and food security in the Middle East:

    OpenAIRE

    1995-01-01

    Against the background of increasing interest in closer economic relations in the Middle East, the contribution that greater integration of markets might make to improving food security in the region is investigated, using a quantitative framework for gauging the reduction in instability of market supplies for cereal, meat, and dairy commodities under regional cooperation schemes versus more general policies to increase the integration of Middle East markets with markets in Western Europe and...

  19. Promoting International Energy Security. Volume 3: Sea-Lanes to Asia

    Science.gov (United States)

    2012-01-01

    rerouted through Indonesia’s Lombok Strait, but this would increase transit time, expenses (because of the longer distance traveled), and navigational...risks. Infrastructure and security on the Lombok Strait are, how- ever, more limited than in the Malacca Strait, and it is unclear whether, on short...notice, the Lombok Strait would be able to safely accommodate the increased traffic of a large-scale shift. A significant energy disruption in Asia

  20. The Key Conceptions of Social Security: the International Practice and Ukraine

    Directory of Open Access Journals (Sweden)

    Dluhopolska Tetiana I.

    2017-02-01

    Full Text Available The world-wide globalization processes and the political-military conflicts have exacerbated the problem of social security of the people of various world countries, which is usually seen from the perspective of both the State and the individual citizen. The article is aimed at analyzing the existing conceptions of social security from different perspectives – political, economic efficiency, and narrative. An analysis of political theories of social security (majority rational voting; pressure groups has determined that they are based on the redistribution processes, and winning of the individual economic agents is achieved in the political struggle for various «social prizes». An analysis of theories of efficiency (optimal redistribution; optimal retirement insurance; prodigal father; misguided Keynesian; longevity insurance; government economizes on administration costs; return on human capital investment has determined that they rely on market «fiasco» and can help in understanding which from the social protection programs minimize market failures. An analysis of the descriptive (narrative theories (chain letters; lump of labor; monopoly capitalism; nearly rational policy has determined that they are difficult subject to the mathematical interpretation and partially repeat ideas of the previous concepts.

  1. 证券市场国际化、人民币国际化与习际金融中心建设的影响机制研究%Study on the Influential Mechanisms of the Internationalization of Securities Market and RMB and the Construction of International Financial Center

    Institute of Scientific and Technical Information of China (English)

    杨成长; 单豪杰

    2011-01-01

    本文首先对相关的概念进行了界定,通过理论分析和国际经验的比较对几个重要相关变量之间的逻辑关系进行了分析,得出证券市场国际化是推动国际金融中心的突破口。接着,在探讨了整个金融体系市场化几个核心问题的基础上,对证券市场国际化、人民币国际化与国际金融中心之间的影响机制进行了微观分析,并结合中国目前的实践状况,得出了上海证券市场国际化与国际金融中心建设协调发展的路径安排。%This paper first defines the relevant concepts, and then analyzes the logical relations among several important variables by theoretical analysis and international experiences comparison, it concludes that the internationalization of stock markets is a breakthrough of the construction of the international financial center. After exploring some of the core issues of the liberation of the entire financial markets, this paper discussed the influential mechanisms of the internationalization of securities and the RMB and the construction of the financial center in a microscopic way. Combined with the current environment of China, the paper brings some paths for the coordinated development of Shanghai international financial center and the internationalization of the securities market.

  2. The establishment of the High Level Panel of Experts on food security and nutrition (HLPE). Shared, independent and comprehensive knowledge for international policy coherence in food security and nutrition

    OpenAIRE

    2011-01-01

    Following the 2007-2008 food crisis, improvements of world food governance was at the centre of international discussions, leaning towards a new Global Partnership for Agriculture, Food Security and Nutrition. In this process, the issue of the management of various streams of knowledge appeared a central element to allow for better policy coordination, and led to the creation of the High Level Panel of Experts on food security and nutrition (HLPE). Here we describe the genesis and unveil the ...

  3. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  4. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    Directory of Open Access Journals (Sweden)

    Sadeghizadeh Atefeh

    2009-06-01

    Full Text Available Abstract Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries.

  5. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  6. 内网安全管理平台研究与实践%Internal Network Security Management Platform Within the Research and Practice

    Institute of Scientific and Technical Information of China (English)

    应洪波; 林萱

    2011-01-01

    This article comprehensively analyze the government internal network security issues and the reasons for frequent security risks.Within the government internal network by building coverage of provincial,municipal and county levels of administration security management,security technology and work processes for the integration of a unified management platform.As a basis to build whole network 'discovery,alerts,disposal,feedback,assessment' are integrated into the management,implementation Informationization security management,networking,security management capabilities to enhance government departments management levels and to protect government internal network security.%本文全面分析了政府内网安全问题不断突显,安全隐患频出的原因,通过在政府内网内建设覆盖省、市、县三级的融行政安全管理、安全技术和工作流程为一体的统一的管理平台,以此为依托,建立全程全网"发现、警示、处置、反馈、考核"五位一体的管理模式,实现安全管理工作的信息化、网络化,提升政府部门安全管理能力和管理水平,保障政府内网的安全。

  7. 78 FR 17266 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-20

    ... International (``MDLZ''), Medivation, Inc. (``MDVN''), Mead Johnson Nutrition Co. (``MJN''), 3M Company (``MMM...''), Hecla Mining Company (``HL''), Harley--Davidson, Inc. (``HOG''), ICICI Bank Ltd. (``IBN.... (``PRU''), Royal Caribbean Cruises Ltd. (``RCL''), Raytheon Company (``RTN''), Riverbed Technology...

  8. INFORMATION-PSYCHOLOGICAL IMPACT OF INTERNATIONAL LAW SUBJECTS AS A THREAT TO RUSSIAN NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. V. Sobolnikov

    2016-01-01

    Full Text Available The article is devoted to research of informationpsychological impact of a subject of international law on the population of Russia. As the basis of the study put the US and NATO in order to optimize the system of psychological protection. Based on the analysis of the Anglo-Saxon version information press highlighted the conceptual background exposure. Important is the implementation of the doctrine of "soft power" and effectiveness of the mechanisms of psychological influence. The analysis of individual research projects at a granular level allows you to unlock the potential of destructive psychological impact on the population of Russia and to identify trends. Special attention is paid to the susceptibility of Russians influence over the Internet that, according to the author, leads to a probabilistic transformation of thinking and directional behavior. The process of constructing the virtual environment impact from its components: the tab-level response, providing spatial temporal resolution in contact, etc. Programming an effective communication network is based on the fact that the thinking of modern man more quickly and adaptive, and thought processes are single-line and limited. At the same time lays the possibility of the sense of presence in a virtual environment, the initiation of metacognitive processes responsible for adaptation to cognitive context information. The directions of further research is focused.

  9. Exploring the Security Dimension of Sino-US Trade Asymmetry. Implications for the International Trade System

    Science.gov (United States)

    2010-01-01

    which he labels a “benign version of mercantilism .” He argues for substantial self-reliance in such vital sectors as defense, energy, and food...of the liberal market . . . favors established strength over new entrants . . . so that mercantilism becomes a strategy not against the liberal...the Global Asset Market Boom,” International Finance 10, no. 3 (2007): 215–39. 12. Barry Buzan, People, States and Fear: An Agenda for International

  10. International typing study of Clostridium difficile.

    Science.gov (United States)

    Manzo, Carl E; Merrigan, Michelle M; Johnson, Stuart; Gerding, Dale N; Riley, Thomas V; Silva, Joseph; Brazier, Jon S

    2014-08-01

    We report the results of an international Clostridium difficile typing study to cross reference strain designations for seven typing methodologies and facilitate inter-laboratory communication. Four genotypic and three phenotypic methods were used to type 100 isolates and compare the results to 39 PCR ribotypes identified among the collection.

  11. Fluid Studies on the International Space Station

    Science.gov (United States)

    Motil, Brian J.

    2016-01-01

    Will discuss the recent activities on the international space station, including the adiabatic two phase flow, capillary flow and interfacial phenomena, and boiling and condensation. Will also give a historic introduction to Microgravity Studies at Glenn Research Center. Talk will be given to students and faculty at University of Louisville.

  12. A Military Campaign Against Gangs: Internal Security Operations in the United States by Active Duty Forces

    Science.gov (United States)

    1993-05-14

    gangs sprouted as a direct result of the threat from the CRIPs . One of the more well known of these new gangs is the Bloods . Figure 2 - Spread Of The... CRIPs , red for BLOODs , etc. In addition gang members often associate themselves with designer athletic clothing. The gang’s colors are their uniform, much...associated violence and drugs are a real and growing threat to the security of the nation.’ One of the largest street gangs in the country is the CRIPs

  13. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was

  14. Demonstration of novel, secure, real-time, portable ultrasound transmission from an austere international location.

    Science.gov (United States)

    Ogedegbe, Chinwe; Morchel, Herman; Hazelwood, Vikki; Hassler, Cynthia; Feldman, Joseph

    2012-01-01

    There is not sufficient access to medical care or medical expertise in many parts of the world. An innovative telemedicine system has been developed to provide expert medical guidance to field caregivers [who have less medical expertise but can reach the patient population in need]. Real-time ultrasound video images have been securely transmitted from the Dominican Republic to Hackensack University Medical Center, Hackensack NJ (HackensackUMC), while the expert physician at HackensackUMC maintained direct voice communication with the field caregiver. Utilizing a portable ultrasound machine (Sonosite) integrated with portable broadcasting device (LiveU), extended Focused Assessment Sonography in Trauma (e-FAST) examinations were performed on healthy volunteers and transmitted via the local cellular network. Additionally, two e-FAST examinations were conducted from a remote location without cellular coverage and transmitted via broad ground area network (BGAN) satellites. The demonstration took the technology "out of the lab" and into a real life, austere environment. The conditions of the Dominican Republic ultrasound mission provided experience on how to manage and utilize this innovative technology in areas where reliable communications and medical coverage are not readily available. The resilient transmission capabilities coupled with the security features deem this portable Telesonography (TS) equipment highly useful in the telemedicine forefront by offering healthcare in underdeveloped areas as well as potentially enhancing throughput in disaster situations.

  15. Review: ICCS International Civics and Citizenship Study

    Directory of Open Access Journals (Sweden)

    Anu Toots

    2010-11-01

    Full Text Available In November 2010 the largest international study ever conducted on civic education in secondary schools has been released in Brussels. The study was performed under the auspices of the International Association for the Evaluation of Educational Achievement (IEA, an independent consortium that brings together educational researchers and policy makers in 62 countries around the world. The IEA is probably more widely known in connection of large-scale comparative studies on educational assessment in math and science (TIMSS and in reading (PIRLS. Yet, the association has longstanding and impressive expertise also in civic education. The first study in this area has been carried out already in 1971 (Torney et al., 1975, the second – so called CIVED in 1999 (Torney-Purta et al., 2001 and now, ten years later, 38 counties around the world participated in the third study – the IEA International Civic and Citizenship Education Study (ICCS. The study tested in 2008–2009 over 140,000 lower secondary students, over 62,000 teachers and headmasters from 5,300 schools in order to analyse how young people are prepared to undertake their roles as citizens.

  16. Quantifying Security Threats and Their Potential Impacts: A Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2010-01-01

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.

  17. Economic study of the organizational mechanism of economic security companies

    OpenAIRE

    Vaskova, Yulia

    2014-01-01

    In today's adverse economic conditions is particularly important preventive anti-crisis policy. Important precondition for the prevention of crisis situations is to ensure economic security. Exploring the economic essence of the organizational mechanism of economic security allows its effective application.

  18. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Science.gov (United States)

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  19. The Importance of Authorized Economic Operator Institution for the Security of Supply Chain in the International Goods Turnover of Polish Enterprises

    Directory of Open Access Journals (Sweden)

    Miroslawa Laszuk

    2016-01-01

    Full Text Available Together with the growth of international exchange of goods also the number of threats increases that potentially may influence the security of functioning international supply chains. Currently, there is a need of developing solutions which aim at facilitating flow of goods, simultaneously ensuring security against the increasing number of threats related to e.g. terrorist attacks, illegal smuggling, thefts and tax frauds. The article presents institution of an authorized operator – Authorized Economic Operator (AEO, introduced on the territory of the European Union in 2008. The discourse demonstrates influence of functioning AEO certificates on security of international supply chains with the particular attention drawn on the importance of AEO institution for Polish operators.

  20. Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia.

    Science.gov (United States)

    Frohde, Kenny; Brooks, David J

    2014-01-01

    Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.

  1. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  2. International Drug Trafficking--a Growing National Security Concern for Low Intensity Conflict

    Science.gov (United States)

    1990-03-01

    Colombia provides roughly 40 percent and Mexico produces at least 25 percent for U. S. consumption. Lesser producers, such as Jamaica and Belize...Five Countries, 1985-88 10000- 8000- 0 00 U 1985 1986 1987 1988 SColumbia *USA (Donicst.1c) 5 lcllze E2 Mexico Jamaica Sourcc: National Narcotics...applied. A second focus of our strategy must be to discourage still minor cannabis producers in Central and South 76 International Initiatives America

  3. The United Nations and One Health: the International Health Regulations (2005) and global health security.

    Science.gov (United States)

    Nuttall, I; Miyagishima, K; Roth, C; de La Rocque, S

    2014-08-01

    The One Health approach encompasses multiple themes and can be understood from many different perspectives. This paper expresses the viewpoint of those in charge of responding to public health events of international concern and, in particular, to outbreaks of zoonotic disease. Several international organisations are involved in responding to such outbreaks, including the United Nations (UN) and its technical agencies; principally, the Food and Agriculture Organization of the UN (FAO) and the World Health Organization (WHO); UN funds and programmes, such as the United Nations Development Programme, the World Food Programme, the United Nations Environment Programme, the United Nations Children's Fund; the UN-linked multilateral banking system (the World Bank and regional development banks); and partner organisations, such as the World Organisation for Animal Health (OIE). All of these organisations have benefited from the experiences gained during zoonotic disease outbreaks over the last decade, developing common approaches and mechanisms to foster good governance, promote policies that cut across different sectors, target investment more effectively and strengthen global and national capacities for dealing with emerging crises. Coordination among the various UN agencies and creating partnerships with related organisations have helped to improve disease surveillance in all countries, enabling more efficient detection of disease outbreaks and a faster response, greater transparency and stakeholder engagement and improved public health. The need to build more robust national public human and animal health systems, which are based on good governance and comply with the International Health Regulations (2005) and the international standards set by the OIE, prompted FAO, WHO and the OIE to join forces with the World Bank, to provide practical tools to help countries manage their zoonotic disease risks and develop adequate resources to prevent and control disease

  4. The International Traffic in Arms Regulations: An Impediment to National Security

    Science.gov (United States)

    2008-05-02

    USML )2 and subject to the more rigorous review and heightened scrutiny of the International Traffic in Arms Regulations (ITAR).3 The timely resolution...export of the defense articles and services that are listed on the United States Munitions List ( USML ).5 The ITAR prohibits exporting6 technical data or...eligible to receive USML -controlled technical data or hardware without a license) is defined in the ITAR as  A U.S. citizen,  A permanent resident who

  5. Damage invariant and high security acquisition of the internal fingerprint using optical coherence tomography

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-11-01

    Full Text Available as the stratum corneum. Regardless of any advances in this field, this approach to fingerprint acquisition by scanning the surface skin only is restricted by the input data (the condition of the human fingerprint itself) and the representation afforded (a 2D...CIS-2016 Published by Infonomics Society ISBN: 978-1-908320-66-7 34 Epidermis Papillary Junction (Internal Fingerprint) Dermis Stratum Corneum (Surface Fingerprint) 3mm 512 pixels 10...

  6. International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress

    Science.gov (United States)

    2010-03-18

    crime-terrorism facilitators such as Viktor Bout, Monzer Al Kasser , and Abu Ghadiyah. Policy considerations discussed in this report include possible...2007 arrest and subsequent conviction, Al Kasser had been involved in international arms trafficking since the early 1970s.125 In 2001, he reportedly...sting operation led by DEA, Al Kasser and an associated agreed to sell a variety of weapons to the FARC, including 15 surface-to-air missiles, 4,000

  7. American Security and the International Energy Situation. Volume 4. Collected Papers

    Science.gov (United States)

    1975-04-15

    both issues are cases in which narrowly self-interested policies threaten broader community pur- poses and in which exclusivist policy takes from the...establish patterns for enhanced international management of access to future scarce resources. Second, the exclusivist pricing policy of the OPEC...breaking the OPEC cartel and its exclusivist price policy. Currently there is excess producing capacity within the world’s oil fields estimated at

  8. FOOD SECURITY WITHIN THE FRAMEWORK OF HUMAN RIGHTS DEVELOPMENT AT INTERNATIONAL LEVEL*

    OpenAIRE

    Mădălina Virginia ANTONESCU

    2014-01-01

    At the beginning of 21st century, the global society is confronted with specific phenomena as chronic starvation of entire populations, malnutrition, limited access to natural resources, urbanization, migration, pollution, industrial damages produced to natural environment, global climate change etc. As direct consequences of these phenomena, international contemporary law must develop and consolidate accordingly. The paper is making an analysis of “food security” concept from a juridical poi...

  9. Work ability and health of security guards at a public University: a cross-sectional study.

    Science.gov (United States)

    Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante

    2016-01-01

    to evaluate the work ability and health status of security guards at a public University. a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged.

  10. Compartive study of Internet of Things infrastructure and security

    DEFF Research Database (Denmark)

    Singh, Bhupjit; Kaur, Bipjeet

    With increasing use of IoTs in diverse fields has increased the demands of different parameters for high level of security, trust and applications. Several companies have invested millions of dollar to fulfill the needs of the market which has given rise variant infrastructures of Io......Ts. In this paper we have compared the different infrastructures and their parameters along with establishing the requirements of security in IoTs. The various vulnerabilities in the IoTs architecture and consideration for privacy control is also discussed. After identifying the security issues in IoTs , this paper...

  11. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    Directory of Open Access Journals (Sweden)

    Moses Okechukwu Onyesolu

    2012-04-01

    Full Text Available The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric authentication scheme for automated teller machine (ATM banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is fused with the ATM for person authentication to ameliorate the security level.

  12. The study on network security based on software engineering

    Science.gov (United States)

    Jia, Shande; Ao, Qian

    2012-04-01

    Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.

  13. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  14. Pengaruh Pemasaran Internal dan Kualitas Layanan Internal Terhadap Kepuasan Pelanggan Internal (Studi Pada Industri Kepariwisataan di Daerah Istimewa Yogyakarta

    Directory of Open Access Journals (Sweden)

    Jumadi Jumadi

    2016-06-01

    Full Text Available The aim of this research is to investigate the implication of internal marketing and internal service quality effectivity towards internal customer satisfaction in Tourism Industry in Yogyakarta Special Territory. This internal marketing studyinvolves variables of motivation and reward system, effective communication, effective employee's selection, effective recruitment, effective development, effective support system, and healthy work environment. While the internal quality service aspects that will be examined in this study are: tangible, emphaty, responsiveness, reliability and assurance, and then their influences on internal customer satisfaction would be analyzed.The sample size is 210 respondents,which is determined using purposive sampling method. The main instrument for data collection in this study is through questionnaire. The analysis tool used to examine the hypothesis of the study is Structural Equation Modeling using AMOS Version 20.0 Software. The result of the study shows that: Internal marketing and internal quality service significantly influence internal customers satisfation. However, the internal quality service influence the internal customers satisfaction more significantly. Therefore the managers in tourism industry should improve the internal marketing more than the internal quality service.

  15. CompTIA Security+ Deluxe Study Guide Exam SY0-301

    CERN Document Server

    Dulaney, Emmett

    2011-01-01

    Get a host of extras with this Deluxe version including a Security Administration Simulator!  Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide, the Deluxe Edition gives you over additional hands-on lab exercises and study tools, three additional practice exams, author videos, and the exclusive Security Administration simulator. This book is a CompTIA Recommended product. Provides 100% coverage of all e

  16. The DISAM Journal of International Security Assistance Management. Volume 24, Number 3, Spring 2002

    Science.gov (United States)

    2002-01-01

    be major problems in certain parts of the Middle East and South Asia. In many parts of Africa, female genital mutilation continued to damage the...practice each year. In March 2001 the U.S. State Department released a Report on Female Genital Mutilation . The international community strongly...0.000 Nigeria 10.000 10.000 6.000 South Africa 0.000 6.000 6.000 Subtotal, Africa 18.200 19.000 15.000 EAST ASIA AND THE PACIFIC East Timor 1.796 1.000

  17. Biosafety, biosecurity and internationally mandated regulatory regimes: compliance mechanisms for education and global health security

    Science.gov (United States)

    Sture, Judi; Whitby, Simon; Perkins, Dana

    2015-01-01

    This paper highlights the biosafety and biosecurity training obligations that three international regulatory regimes place upon states parties. The duty to report upon the existence of such provisions as evidence of compliance is discussed in relation to each regime. We argue that such mechanisms can be regarded as building blocks for the development and delivery of complementary biosafety and biosecurity teaching and training materials. We show that such building blocks represent foundations upon which life and associated scientists – through greater awareness of biosecurity concerns – can better fulfil their responsibilities to guard their work from misuse in the future. PMID:24494580

  18. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    OpenAIRE

    Moses Okechukwu Onyesolu; Ignatius Majesty Ezeani

    2012-01-01

    The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's) for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric auth...

  19. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Helen H [Los Alamos National Laboratory

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  20. Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2017-01-09

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  1. Environmental Security Studies%环境安全研究

    Institute of Scientific and Technical Information of China (English)

    Rita Floyd; Richard A.Mattew; 马也力(译)

    2014-01-01

    Over the past two decades a substantial body of literature has emerged in north America, Europe and throughout much of the developing world exploring the existing and potential linkages between security and the environment. While it explores some ideas that have roots in classical thought, this literature is largely a response to two almost simultaneous events:the end of the Cold War (1989-92), which compelled a rethinking of the concept of security, and the 1992 Rio Earth Summit, which mobilized scientific evidence of global environmental change into a global policy agenda widely regarded as urgent and vital. The ensuing flood of academic enquiry has examined large-scale environmental processes such as climate change and deforestation. It has explored the socio-political effects of changes in natural resource assets at various scales of analysis. It has examined the activities of the military from an environmental perspective and sought to understand the role the environment plays in conflict and in conflict resolution. It has explored the interaction of environmental change with demographic and health factors from a security perspective. It has considered the environment in terms of different levels of security analysis including global, regional, national, subnational and human. It has studied vulnerability to environmental change from the equity and poverty. And it has sought to understand the impacts of strategies for conservation and adaptation to environmental stress in different security contexts.%在过去的二十多年里,在北美洲,欧洲和整个世界涌现出了大量探索现有的安全条件和环境之间存在潜在联系的文献。与此同时还探讨了一些想法,这些研究探索包含了一些经典思想的印记,并且是对两个几乎同时发生的重大事件的反应:一个是“冷战”的结束,迫使人们重新思考安全的概念。另一个是把全球变暖的科学证据提到了全球性的政策制定

  2. Maintaining International Peace and Security: Reflections on Peace-Support Operations in Africa

    Directory of Open Access Journals (Sweden)

    Theo Neethling

    2012-02-01

    Full Text Available The shift from a bipolar to a multipolar and multi-faceted world has reduced the risk of conventional inter-state wars, but has been the cause of several intra-state armed conflicts with an even higher risk of regional instability. Such conflicts and the resurgence of a global activism have produced a dramatic growth in peacekeeping requirements since the end of the previous decade. The international response, mainly through the United Nations (UN, has been to promote preventive diplomacy and, in a number of cases, to conduct peace-support operations. In brief, this paper points out that each UN peace-support operation places an extremely high premium on UN administration, organisation, coordination and resources. To this end, a multiplicity of contributions from various role-players is needed. It also points out that peace-support operations require significant commitments on the part of participating states, specifically the willingness to accept financial costs and fatalities in the interest of promoting international and regional stability. This is especially true in the case of African peacekeeping. This paper, furthermore, underscores the fact that the undertaking of peace-support operations in Africa is by no means a simple and easy task. The nature of peacekeeping missions in certain African countries have, in fact, resulted in an increasing reluctance on the part of the major powers and some of the other traditional troop-contributing nations to deploy on African soil. It concludes that the real impact of the post-Cold War era is that the burden of resolving African conflicts rests more and more on Africans. African countries and organisations are accordingly compelled to take measures and develop strategies to address the peacekeeping requirements on the continent.

  3. The choice of disease control strategies to secure international market access for aquaculture products.

    Science.gov (United States)

    Chinabut, S; Puttinaowarat, S

    2005-01-01

    Since production from capture fisheries cannot meet the demands of exports, aquaculture has subsequently played a major role in securing the raw materials for the world's food industries. Aquaculture has rapidly developed from extensive systems to semi-intensive, intensive and super-intensive systems. This has introduced the use of chemicals and drugs into the systems, which cause residual problems in the products. In the developed world, food safety has become a major issue of concern. The world market now demands healthy aquaculture products from farm to table. To achieve these requirements and to keep their markets, countries involved in aquaculture have implemented control measures such as farm licensing, code of conduct for sustainable aquaculture, hazard analysis and critical control point (HACCP) and good aquaculture practice. However, infectious diseases in aquaculture are of major concern to the industry and are typically controlled by eradication of the pathogen, treatment with antibiotic or chemotherapeutics, and/or by preventative measures such as the use of probiotics or vaccines. To limit the use of chemicals and antibiotics, good farm management is highly recommended. In terms of treatment, chemicals and antibiotics should be evaluated to establish recommended doses and withdrawal periods, otherwise alternative treatments should be developed. Environmentally-friendly probiotics have been introduced to aquaculture practice in the last decade to replace pathogenic bacteria with beneficial bacteria transient in the gut. Micro-organisms have also been prepared for the purpose of biocontrol and bioremediation. The application of probiotic, biocontrol and bioremediation seem promising; however considerable efforts of further research in terms of food and environmental safety are needed. Vaccination has proved highly effective in controlling diseases in the salmon industry mainly in Europe, America and Japan. In other Asian countries, this practice seem to

  4. Study of International Standards of Risk Management

    Directory of Open Access Journals (Sweden)

    Dykan Volodymyr L.

    2014-01-01

    Full Text Available The goal of the article lies in the study of existing international standards of risk management, an important factor of improvement of risk management in domestic corporations and enterprises and development of recommendations on application of international standards in Ukraine, in particular, within the framework of building corporate systems of risk management. The conducted study shows that approaches on organisation of the process of risk management, used in standards of risk management, are of general character and differ with the degree of detailing. Their undoubted value in development of risk management in Ukraine is identification of a general direction of building corporate systems of risk management in practice. The said approaches at the national and corporate levels of standardisation in Ukraine within the framework of building corporate systems of risk management would allow improvement of risk management in corporations and enterprises. The prospect of further studies of domestic specialists in the field of risk management is development of the domestic standard of risk management with consideration of modern domestic specific features of development of risk management in Ukraine and leading foreign experience.

  5. An empirical investigation to analysis the dimensions of cultural security: A case study of educational system

    Directory of Open Access Journals (Sweden)

    Elyas Nouraei

    2013-02-01

    Full Text Available The purpose of this study is to explore the concept of cultural security and its practical implications in a case study of educational system. There are several definitions of culture, which describe different aspects of cultural security. In fact, cultural security tends to show various behaviors, thinking, beliefs and other people’s perspectives in a society, which represents the overall circumstances. Cultural security and its issues make it possible to have a clear image of a society or community. This paper aims to identify the important dimensions of cultural security in terms of basic components of cultural security identified in a framework. Therefore, after identifying the components, using a questionnaire, required data are gathered from the universities of the city of Ilam, Iran and they are analyzed by SPSS18.0 software and its appropriate statistical tests.

  6. Security information in production and operations: a study on audit trails in database systems

    Directory of Open Access Journals (Sweden)

    Rodrigo Roratto

    2015-09-01

    Full Text Available Special care should be taken to verify the integrity and to ensure that sensitive data is adequately protected. One of the key activities for data loss prevention is anaudit. And in order to be able to audit a system, it is important to have reliable records of its activities. Systems that store critical data, whether financial or productive, must have features such as audit log, also called audit trail, which records all activities on critical data. This allows to identify harmful actions that can be internal or external, intentionally or unintentionally caused. Therefore, this paper presents major studies in security audit trail (audit log, especially records of logs, and it presents what is available in terms of commercial tools and what they offer.

  7. My Critique is Bigger than Yours: Constituting Exclusions in Critical Security Studies

    Directory of Open Access Journals (Sweden)

    David Roger Mutimer

    2009-10-01

    Full Text Available Critical Security Studies proceeds from the premise that words are world-making, that is that the ways we think about security are constitutive of the worlds of security we analyse. Turned to conventional security studies and the practices of global politics, this critical insight has revealed the ways in which the exclusions that are the focus of this conference have been produced. Perhaps most notable in this regard has been David Campbell's work, showing how the theory and practice of security are an identity discourse producing both insides and outsides, but the production of excluded others is a theme that runs through the critical scholarship on security in the past decade or more. This article turns the critical security studies gaze on itself, to explore the field's own complicity in the production of exclusions. The article reads three important instances of critical security studies for the inclusions and exclusions they produce: Ken Booth's Theory of World Securitv, the epilogue to David Campbell's Writing Security, and the CASE Collective Manifesto. The article concludes by asking about the nature of the inclusions and exclusions these divisions produce and the politics which those exclusions, in turn, (reproduce.

  8. Public Procurement of Security Technology : A multiple case study of Swedish municipalities and regions

    OpenAIRE

    Rolandsson, Rasmus

    2016-01-01

    Municipalities and regions in Sweden have an increasing need to purchase security technology to secure their properties and their operations. However this procurement process is strictly regulated by the Swedish procurement act (“Lagen om Offentlig Upphandling”, LoU), leading to a similar procurement process. However no academic studies have been done on the procurement of security technology in local authorities.This thesis explores and maps this process and the important aspects which affec...

  9. CONFIGURING THE ROLE OF THE UNITED NATIONS SECRETARYGENERAL IN THE PEACEFUL SETTLEMENT OF INTERNATIONAL DISPUTES. RELATIONS WITH THE SECURITY COUNCIL AND THE GENERAL ASSEMBLY

    Directory of Open Access Journals (Sweden)

    OANA-ADRIANA IACOB

    2012-05-01

    Full Text Available In an international context embracing the idealist concepts of harmony, cooperation, structural peace, illegality of war, the United Nations Organization has created a system of peaceful settlement of disputes, based on principles of justice and international law. In this framework, the organs bearing the responsibility of peaceful resolution of conflicts are the International Court of Justice, the Security Council, the General Assembly and the Secretary-General. The latter has a unique position, triggering a spectacular evolution of its role in the maintenance of international peace and security. The challenges of the international environment and the outstanding ways in which they were addressed by the distinctive personalities that filled the function of the Secretary General, creating precedents and influencing its future development, have led to a continuous enlargement of its role. The purpose of the present paper is that of defining the role of the Secretary-General in the system of peaceful settlement of international disputes created by the United Nations, by analysing the relevant provisions consecrated in the Charter and by revealing and explaining the outstanding evolution of this institution, with an emphasis on the relations of mutual influence between the High Official, on one side, the Security Council and the General Assembly, on the other.

  10. The CSN hosts the Second International Conference on Nuclear Security in Madrid; El CSN acoge en Madrid la Segunda Conferencia Internacional de Seguridad Fisica Nuclear

    Energy Technology Data Exchange (ETDEWEB)

    Scialdone Garcia, A.

    2016-08-01

    The second International Conference on Nuclear Security was held in Madrid between May 9th and 13th last. The acting Minister of the Interior announced that the number of officers of the Guardia Civil watching over the Spanish nuclear power plants will be doubled. (Author)

  11. The EU internal security strategy, the EU policy cycle and the role of (AFSJ) agencies: promise, perils and pre-requisites

    NARCIS (Netherlands)

    Busuioc, M.; Curtin, D.

    2011-01-01

    The present briefing note analyses and reflects on the EU policy cycle (within the broader context of the EU’s internal security strategy), with a focus on the role of European agencies and ongoing initiatives for inter-agency cooperation. It discusses the specific approach adopted, its state of pla

  12. Security Assistance in the Modernization of the People’s Liberation Army: A Case Study

    Science.gov (United States)

    1988-09-01

    intellectual impedimenta of Confucian China , their sense of historical continuity remains undiminished ( Starbuck , 1981:1). China Prior to 1949 Western...rapidly expanding production technology, aggressively seeking international markets and potentially becoming economically a more powerful Japan or...military strength, will assure the security of China into the 21st Century (Kenny, 1987:42). Internal Factors. A restructuring of the PLA has been

  13. Sourcing of Internal Auditing: An Empirical Study

    NARCIS (Netherlands)

    R.F. Speklé (Roland); H.J. van Elten; A.M. Kruis

    2005-01-01

    textabstractIn recent years, the scope of internal auditing has broadened considerably, increasing the importance of internal auditing as part of the organization’s management control structure. This expanding role has changed the demands being put on internal auditors. Their new role requires diffe

  14. Sourcing of internal auditing : An empirical study

    NARCIS (Netherlands)

    Speklé, R.F.; Elten, van H.J.; Kruis, A.

    2005-01-01

    In recent years, the scope of internal auditing has broadened considerably, increasing the importance of internal auditing as part of the organization’s management control structure. This expanding role has changed the demands being put on internal auditors. Their new role requires different skills

  15. Developing an analytical model to increase urban security from the Secured perspective by Designing (SBD Approach using fuzzy AHP method (case study: region 17 of Tehran

    Directory of Open Access Journals (Sweden)

    H. Zabihi

    2013-01-01

    . Journal of Environmental Psychology, 13(1, 3-28.Cozens, P. (2008. Crime prevention through environmental design in Western Australia: planning for sustainable urban futures. International Journal of Sustainable Development and Planning, 3(3, 272-292.Cozens, P. M., Saville, G., & Hillier, D. (2005. Crime prevention through environmental design (CPTED: a review and modern bibliography. Property Management, 23(5, 328-356.Dagdeviren, M., & Yüksel. (2008. Developing a fuzzy analytic hierarchy process (AHP model for behavior-based safety management. Information Sciences, 178(6, 1717-1733. Kahraman, C. (2008. Fuzzy multi-criteria decision making: theory and applications with recent developments (Vol. 16: Springer Verlag.Kahraman, C., Ertay, T., & Buyukozkan, G. (2006. A fuzzy optimization model for QFD planning process using analytic network approach. European Journal of Operational Research, 171(2, 390-411.Rezvan, A. (2007. Environmental security and the Role of Urban Planning in It s Promotion and Improvement (Case Study: Region 17th of the City of Tehran. Degree of Master of Art (M.A, Tarbiat Modares University.Tolga, E., Demircan, M. L., & Kahraman, C. (2005. Operating system selection using fuzzy replacement analysis and analytic hierarchy process. International Journal of Production Economics, 97(1, 89-117. Wilson, J. Q., & Kelling, G. L. (1982. Broken Windows: The Police and Neighborhood Safety. The Atlantic Monthly, 3, 29-38.

  16. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  17. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developi

  18. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developi

  19. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  20. Audit for Information Systems Security

    Directory of Open Access Journals (Sweden)

    Ana-Maria SUDUC

    2010-01-01

    Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.

  1. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  2. What Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow Posts

    Institute of Scientific and Technical Information of China (English)

    Xin-Li Yang; David Lo; Xin Xia; Zhi-Yuan Wan; Jian-Ling Sun

    2016-01-01

    Security has always been a popular and critical topic. With the rapid development of information technology, it is always attracting people’s attention. However, since security has a long history, it covers a wide range of topics which change a lot, from classic cryptography to recently popular mobile security. There is a need to investigate security-related topics and trends, which can be a guide for security researchers, security educators and security practitioners. To address the above-mentioned need, in this paper, we conduct a large-scale study on security-related questions on Stack Overflow. Stack Overflow is a popular on-line question and answer site for software developers to communicate, collaborate, and share information with one another. There are many different topics among the numerous questions posted on Stack Overflow and security-related questions occupy a large proportion and have an important and significant position. We first use two heuristics to extract from the dataset the questions that are related to security based on the tags of the posts. And then we use an advanced topic model, Latent Dirichlet Allocation (LDA) tuned using Genetic Algorithm (GA), to cluster different security-related questions based on their texts. After obtaining the different topics of security-related questions, we use their metadata to make various analyses. We summarize all the topics into five main categories, and investigate the popularity and difficulty of different topics as well. Based on the results of our study, we conclude several implications for researchers, educators and practitioners.

  3. A study about strategic management at internal security and governors together with the leadership obstaclesİç güvenlikte stratejik yönetim ve liderlik kısıtlılığı ile mülki amirlerin durumuna dair bir çalışma

    Directory of Open Access Journals (Sweden)

    Cemal Öztürk

    2016-11-01

    Full Text Available Strategic management, the road map for achieving the organization's goals and objectives, evaluating the environmental factors; ways and methods of an organization are followed to achieve the objectives; and it is the implementation of the Strategic Planning. Strategic planning is a tool that provides direction and meaning to an organization's daily operations. It relate these factors together with the desired future condition of organization by evaluating the values, the current situation and the enviroment of organization. Strategic management objectives; to create a continuous commitment to the organization's mission and vision, to maintain a sense of support and define the mission and vision and to create a clear focus on the strategic function of the organization In terms of action and decision-making processes. The presence and  attendance of any other public or private organizations depends on the existence and success of internal security organization, because management of internal security organizations affacts the environmental factors of all the other institutions. The classic and new approach to public administration in security management is also lacking and the most important solution to solve this problem is possible tohether with strategic administration. Strategic security management requires an operational structure that is more local and has a shorter intervention process. In addition to this, it is also possible to develop hybrid or situational security solutions (classical-modern or civil-militarist in accordance with the current situation. A strategic security management model that, has mission with immediate intervention and highest level of smearing may be able to make the transition to a security system that is compatible with the basic philosophy of the public administration nowadays. Beside these, it is known governors and district governors do not make strategic plans.   They are being deprived of the opportunity

  4. Gastroschisis and associated defects: an international study.

    LENUS (Irish Health Repository)

    Mastroiacovo, Pierpaolo

    2007-04-01

    Our objective was to evaluate the frequency and type of malformations associated with gastroschisis in a large pool of international data, to identify malformation patterns, and to evaluate the role of maternal age in non-isolated cases. Case-by-case information from 24 registries, all members of the International Clearinghouse for Birth Defects Surveillance and Research (ICBDSR), were evaluated. After the exclusion of other abdominal wall defects cases were classified as: (a) isolated; (b) recognizable syndrome, chromosomal or not; (c) multiple congenital anomalies (MCA). Our results showed that out of 3,322 total cases 469 non-isolated cases were registered (14.1%): 41 chromosomal syndromes, 24 other syndromes, and 404 MCA. Among MCA four groups of anomalies were most frequent: CNS (4.5%), cardio-vascular (2.5%), limb (2.2%), and kidney anomalies (1.9%). No similar patterns emerged except two patterns resembling limb-body wall complex and OEIS. In both of them the gastroschisis could be however misclassified. Chromosomal trisomies and possibly non-syndromic MCA are associated with an older maternal age more than isolated cases. On consideration of our data and the most valid studies published in the literature, the best estimate of the proportion of gastroschisis associated with major unrelated defects is about 10%, with a few cases associated to recognizable syndromes. Recognized syndromes with gastroschisis seem to be so exceptional that the well documented and validated cases are worth being published as interesting case report. An appropriate case definition in etiological studies should include only isolated gastroschisis after an appropriate definition of isolated and non-isolated cases and a thorough case-by-case review.

  5. European Insecurity: Managing Changing Relations at Home and Abroad : Interviews with Dr. Margriet Drent and Dr. Bibi van Ginkel of the Security and Conflict Programme of the Netherlands Institute of International Relations ‘Clingendael’

    NARCIS (Netherlands)

    Fraser, J.A.

    2012-01-01

    Interviews with Dr. Margriet Drent and Dr. Bibi van Ginkel of the Security and Conflict Programme of the Netherlands Institute of International Relations 'Clingendael' Dr. Margriet Drent is a Senior Research Fellow at the Security and Conflict Programme of the Netherlands Institute of International

  6. A study on an information security system of a regional collaborative medical platform.

    Science.gov (United States)

    Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong

    2010-01-01

    The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.

  7. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  8. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  9. Information security risk management for computerized health information systems in hospitals: a case study of Iran.

    Science.gov (United States)

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.

  10. Analysis of Maize versus Ethanol Production in Nebraska, United States and International Agricultural Droughts: Lessons for Global Food Security

    Science.gov (United States)

    Boken, V.; Tenkorang, F.

    2012-04-01

    Nebraska is one of the eight main corn (maize) belt states of the United States. Maize is the major crop of Nebraska with an average annual production of about 38 million tons (about 12% of U.S. production), which contributes billions of dollars to the state's economy. The yield of maize has increased significantly over the past century - from 1.6 t/ha in 1900 to 10.4 t/ha in 2010. While the majority of maize (about 40%) is currently used for animal feed and ethanol production, only about six percent is exported. It is estimated that about one billion people accounting for about 15% population of the world live in chronic hunger because of low agricultural productivity and drought. Most of these people depend on the U.S. for grains including maize. If a greater quantity of maize is diverted to ethanol production, considerably less quantity of maize would be available for export to developing countries where it could be used for human consumption and to mitigate hunger and improve food security. This paper presents analysis of maize production in Nebraska for the past three decades and examines how its commercialization for ethanol production has affected its exports in the face of drought at an international level.

  11. A study on the trend of international radioactive material regulation since the terrorist attacks of September 11, 2001

    Energy Technology Data Exchange (ETDEWEB)

    Ryu, J. S. [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    AI-Qaeda and other terrorist groups have tried to obtain the radioactive material which could be used to make a dirty bomb, and their documents relating to dirty bombs were found in the January 2003. International communities especially, the United States has made efforts to improve infrastructure of radiation regulation and security of radioactive material for protecting its people from radiological attacks. This study examines the likelihood of radiological terrorism and the radiological dispersal devices which could be used by determined terrorists, and the trend of international communities to respond it through improvement on radiation regulation and security.

  12. The Study on Progression for Consolidating the Nuclear Security Legislative System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae San; Jung, Myung Tak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next.

  13. The Danish Perspective on Baltic Security.

    Science.gov (United States)

    1998-01-01

    Brundtland & Don M. Snider, Nordic-Baltic Security: An International Perspective (Washington D.C.: the Center for Strategic & International Studies, 1994...Martin’s Press, c1992), p. 24. 180berg, p. 24-25. 19Arne Olav Brundtland & Don M. Snider, Nordic-Baltic Security: An International Perspective...Oznobistchev, "Russia in its Neighboring Environment: New Challenges and New Policy?" in Arne Olav Brundtland and Don M. Snider (eds.), Nordic-Baltic

  14. Study or internship abroad and the acquisition of international competencies

    NARCIS (Netherlands)

    Hoven, R.F.M. (Rudy) van den; Walenkamp, Jos; Heijer, J. den

    2015-01-01

    The focus of the present study is the extent to which an internship or study abroad contributes to students’ development of international competencies, such as interpersonal and intercultural competencies, foreign language skills, and international academic and professional competencies.

  15. Study or internship abroad and the acquisition of international competencies

    NARCIS (Netherlands)

    J. den Heijer; Jos Walenkamp; R.F.M. (Rudy) van den Hoven

    2015-01-01

    The focus of the present study is the extent to which an internship or study abroad contributes to students’ development of international competencies, such as interpersonal and intercultural competencies, foreign language skills, and international academic and professional competencies.

  16. An international study of research misconduct policies.

    Science.gov (United States)

    Resnik, David B; Rasmussen, Lisa M; Kissling, Grace E

    2015-01-01

    Research misconduct is an international concern. Misconduct policies can play a crucial role in preventing and policing research misconduct, and many institutions have developed their own policies. While institutional policies play a key role in preventing and policing misconduct, national policies are also important to ensure consistent promulgation and enforcement of ethical standards. The purpose of this study was to obtain more information about research misconduct policies across the globe. We found that twenty-two of the top forty research and development funding countries (55%) had a national misconduct policy. Four countries (18.2%) are in the process of developing a policy, and four (18.2%) have a national research ethics code but no misconduct policy. All twenty-two countries (100%) with national policies included fabrication, falsification, and plagiarism in the definition of misconduct, but beyond that there was considerable diversity. Unethical authorship was mentioned in 54.6% of the misconduct definitions, followed by unethical publication practices (36.4%), conflict of interest mismanagement (36.4%), unethical peer review (31.8%), misconduct related to misconduct investigations (27.3%), poor record keeping (27.3%), other deception (27.3%), serious deviations (22.7%), violating confidentiality (22.7%), and human or animal research violations (22.7%). Having a national policy was positively associated with research and development funding ranking and intensiveness. To promote integrity in international research collaborations, countries should seek to harmonize and clarify misconduct definitions and develop procedures for adjudicating conflicts when harmonization does not occur.

  17. Information Security Analysis: A Study to Analyze the Extent to Which Information Security Systems Can Be Utilized to Prevent Intoxicated Individuals from Driving

    Science.gov (United States)

    Pierre, Joseph D.

    2011-01-01

    Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…

  18. Attachment security balances perspectives: Effects of security priming on highly optimistic and pessimistic explanatory styles

    Directory of Open Access Journals (Sweden)

    Yanhe Deng

    2016-08-01

    Full Text Available Highly optimistic explanatory style (HOES and highly pessimistic explanatory style (HPES are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming – activating supportive representations of attachment security – on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: The security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  19. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  20. Microgrid Study: Energy Security for DoD Installations

    Science.gov (United States)

    2012-06-18

    performance characteristics (cost, maturity), and the microgrid goals (energy security, power quality, reduced carbon dioxide emissions ). The two variables... Palms to drastically cut the use of boilers that were high emissions and low efficiency, but this unfortunately did not count towards the California...the cost of oil , and an increase in the deployment of renewable generation on domestic military installations have all led the Department of Defense

  1. A feasibility study for an International Year of Landcare

    Science.gov (United States)

    Mutota, E.; Arnalds, A.

    2009-04-01

    Human-induced activities place enormous pressures on the land worldwide, creating competition and conflict, and suboptimal use of the land. Climate change, loss of biodiversity and land degradation leads to decreasing productivity, food and water shortages, and reduced economic benefits, among others. In order to address these challenges and achieve sustainability goals, the need to change the way global resources are being utilized is crucial. A holistic and integrated community-based approach such as Landcare could be a viable approach to meet this worldwide challenge. Landcare is about committed people working together on land rehabilitation and restoration projects at the local level, transforming attitudes and stimulating new ideas among land users, generating support and building partnerships between and among local communities, governments and the private sector. Landcare initiatives have grown in a number of countries where success stories of actions on the ground clearly show the wider application of the Landcare approach in resolving many of the world's environmental problems and livelihood challenges. However, the potential of Landcare have not yet been widely exploited on a scale that really matters—as local actions build up towards global progress, there is more scope for unified efforts towards a global Landcare movement. Following the recommendation given at the International Forum on Soils, Society and Global Change in 2007 in Iceland (http://www.iisd.ca/YMB/SDFSS/), an International Year of Landcare should be established. Such a year would bring into focus efforts to build local capacity and share knowledge and experiences between provinces, countries and continents on Landcare. Additionally, holding a year concerned with Landcare would greatly contribute to the attainment of the Millennium Development Goals, the UN environmental conventions and many other sustainability goals. Our study supports the notion that Landcare offers a robust platform

  2. A Qualitative Study of Domain Specific Languages for Model Driven Security

    Directory of Open Access Journals (Sweden)

    Muhammad Qaiser Saleem

    2014-05-01

    Full Text Available In Model-Driven development, software system design is represented through models which are created using general purpose modeling languages e.g., UML. Later on system artifacts are automatically generated from these models. Model-Driven Security is a specialization of Model-Driven paradigm towards the domain of security, where security objectives are modeled along the system models and security infrastructures are directly generated from these models. Currently available general purpose modeling languages like UML do not have capability to model the security objectives along the system models. Over the past decade, many researchers are trying to address these limitations of the general purpose modeling languages and come up with several Domain Specific Modeling Languages for Model Driven Security. In this study, a comparative study is presented regarding the security Domain Specific Modeling Languages presented by the most prominent researchers for the development of secure system. A success criteria has been defined and these DSLs are critically analyzed based on it to obtain the qualitative results.

  3. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Internal Scholars%理论·实证和路径:国内学者关于农民工社会保障的研究

    Institute of Scientific and Technical Information of China (English)

    李宏; 杨振; 王卫防

    2011-01-01

    农民工社会保障问题已成为转型期中国能否顺利化解社会矛盾和实现中国经济社会发展的关键,在对农民工社会保障问题从法律视角进行研究之前,有必要对国内学者在于农民工社会保障问题的研究进行梳理.国内学者对农民工社会保障的研究可以分为3类:一是对农民工保障问题进行理论分析,包括农民工的社会保障诉求问题和认识误区、农民工社会保障进行理论构建、农民工社会保障制度建设的政策缺陷、农民工社会保障制度公平建设等方面的研究;二是关于农民工社会保障问题的实证研究,包括农民工社会保障需求的顺序、农民工社会保障的影响因素、社会保障现形成的内在机理等方面的研究;三是农民工社会保障制度建设的路径探索,包括农民工的社会保障体系的多层次发展、浙江农民工社会保障的“双低模式”、“广东模式”和“上海模式”的比较以及根据农民工内部分化后的阶层分类建立多层社会保障体系的研究.%Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social devel opment in China during the transitional period. Before the research of migrant workers from the legal perspective, It is necesssary to review the dometic scholars research results of migrant workers social security . Tlie researches of internal scholars on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appealing of so cial security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in so cial security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of

  4. Chaotic iterations versus Spread-spectrum: chaos and stego security

    OpenAIRE

    Guyeux, Christophe; Friot, Nicolas; Bahi, Jacques

    2010-01-01

    International audience; A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are chaos-secure too. In this paper, the links between the two notions of security is deepened and the usability of ...

  5. Using Post-Study-Abroad Experiences to Enhance International Study

    Science.gov (United States)

    Dean, Kevin W.; Jendzurski, Michael B.

    2013-01-01

    Many study abroad experiences offer opportunities for a broadened global perspective gleaned from interpersonal engagement with cultural others in an international setting. Unfortunately, and far too often, the campus majority who do not have this firsthand travel experience remain disengaged and might feel excluded. This article contends that…

  6. Study on the Community Policing Administration Innovation from the Perspective of the Public Security Governance

    Institute of Scientific and Technical Information of China (English)

    Jian LIN

    2015-01-01

    Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.

  7. The Impact of Conflict on International Student Mobility: A Case Study of International Students Studying in Israel

    Science.gov (United States)

    Ben-Tsur, Dalia

    2009-01-01

    This paper explores the impact of conflict on international student mobility. Through an examination of undergraduate, international students studying in Israel, this case study questions how and if a situation of ongoing violent conflict affects international student travel decisions to study in a host country. Contrary to assumptions of…

  8. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    Directory of Open Access Journals (Sweden)

    O'Neill Conor

    2011-03-01

    Full Text Available Abstract Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246 were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100. Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95 and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943. For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930; low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949. Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement

  9. 76 FR 37403 - Treasury International Capital Form SLT: Report of Aggregate Holdings of Long-Term Securities by...

    Science.gov (United States)

    2011-06-27

    ....-resident end-investors in foreign securities, where for each reporting entity, the consolidated total of.... This consolidated total includes amounts held for a reporting entity's own account and for customers. The reporting entity should include reportable securities for all U.S.-resident parts of the...

  10. DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTURES – WEB SERVICES CASE STUDY

    Directory of Open Access Journals (Sweden)

    M.Upendra Kumar

    2011-07-01

    Full Text Available Software Engineering covers the definition of processes, techniques and models suitable for its environment to guarantee quality of results. An important design artifact in any software development project is the Software Architecture. Software Architecture’s important part is the set of architectural design rules. A primary goal of the architecture is to capture the architecture design decisions. An important part of these design decisions consists of architectural design rules In an MDA (Model-Driven Architecture context, the design of the system architecture is captured in the models of the system. MDA is known to be layered approach for modeling the architectural design rules and uses design patterns to improve the quality of software system. And to include the security to the software system, security patterns are introduced that offer security at the architectural level. More over, agile software development methods are used to build secure systems. There are different methods defined in agile development as extreme programming (XP, scrum, feature driven development (FDD, test driven development (TDD, etc. Agile processing is includes the phases as agile analysis, agile design and agile testing. These phases are defined in layers of MDA to provide security at the modeling level which ensures that security at the system architecture stage will improve the requirements for that system. Agile modeled Layered Security Architectures increase the dependability of the architecture in terms of privacy requirements. We validate this with a case study of dependability of privacy of Web Services Security Architectures, which helps for secure service oriented security architecture. In this paper the major part is given to model architectural design rules using MDA so that architects and developers are responsible to automatic enforcement on the detailed design and easy to understand and use by both of them. This MDA approach is implemented in use of

  11. Information security risk management for computerized health information systems in hospitals: a case study of Iran

    Directory of Open Access Journals (Sweden)

    Zarei J

    2016-05-01

    Full Text Available Javad Zarei,1 Farahnaz Sadoughi2 1Health Information Management, Health Management and Economics Research Center, School of Health Management and Information Science, Iran University of Medical Sciences, Tehran, Islamic Republic of Iran, 2Health Information Management Department, School of Health Management and Information Science, Iran University of Medical Sciences, Tehran, Islamic Republic of Iran Background: In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs, which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran.Materials and methods: This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health.Results: Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals.Conclusion: Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security

  12. A Contrast Study on Chinese and American Feminism Reflected in Martial Security War and Desperate Housewives

    Institute of Scientific and Technical Information of China (English)

    赵凌志

    2015-01-01

    Both Marital Security War and Desperate Housewives reflect modern Chinese and American women’s double pressure and challenges in marriage, career, life etc. This paper made a contrast study on Chinese and American feminism.

  13. A Contrast Study on Chinese and American Feminism Reflected in Martial Security War and Desperate Housewives

    Institute of Scientific and Technical Information of China (English)

    赵凌志

    2015-01-01

    Both Marital Security War and Desperate Housewives reflect modern Chinese and American women's double pressure and challenges in marriage, career, life etc. This paper made a contrast study on Chinese and American feminism.

  14. International Security. Volume 32, Number 4, Spring 2008. No Sign until the Burst of Fire. Understanding the Pakistan-Afghanistan Frontier

    Science.gov (United States)

    2008-03-01

    geography and typography of the International Security 32:4 42 telligence, The Terrorist Threat to the U.S. Homeland (Washington, D.C.: National...ed. (Oxford: Oxford University Press, 1980). 18. Quoted in Stephen Tanner, Afghanistan: A Military History from Alexander the Great to the Fall of...Olaf Caroe, The Pathans (Oxford: Oxford University , 1958). 21. See Thomas H. Johnson and M. Chris Mason, “Understanding the Taliban and Insurgency in

  15. Jointly Building a More Secure Asia through the Power of People——Some Highlight of Commemoration of the International Day of Peace 2014

    Institute of Scientific and Technical Information of China (English)

    Lin; Yongfeng

    2014-01-01

    <正>To observe the International Day of Peace 2014,in accordance with its theme set by the United Nations,i.e.,"Right of Peoples to Peace",the CPAPD together with the UN System in China and the Shanxi Provincial People’s Government jointly held the Commemoration of the International Day of Peace2014,with the theme of"A more secure Asia aspired by people"in Xi’an City,west China during 23-24September 2014.Chinese CPC and state leaders,

  16. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions

    OpenAIRE

    Chen, Jie; Huang, Yan

    2009-01-01

    International audience; In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In this paper include two realization methods: 1.Use such as signature tools, k...

  18. Why the Gulf War still matters: Foreign perspectives on the war and the future of international security. Report No. 16

    Energy Technology Data Exchange (ETDEWEB)

    Garrity, P.J.

    1993-07-01

    This report summarizes the main findings of a Center for National Security Studies (CNSS) project that examined how a number of nations other than the United States have reacted to the course and outcome of the Persian Gulf War of 1991. The project was built around studies of key countries on which the Gulf War might reasonably be expected to have had a significant impact: Argentina, the ASEAN states, Brazil, China, Cuba, Egypt, France, Germany, India, Iran, Iraq, Israel, Italy, Japan, Jordan, Libya, North Korea, Russia, Saudi Arabia, South Korea, Spain, Syria, Taiwan, the United Kingdom, Vietnam, and the states of the former Yugoslavia. These country studies were written by well-recognized independent experts following a common set of guidelines provided by CNSS. When the country studies were completed, they were reviewed and supplemented through a series of peer assessments and workshops. The report represents a synthesis of material generated through this process, and is intended to stimulate thought and further analysis on the critical topics discussed herein.

  19. International Students' Networks: A Case Study in a UK University

    Science.gov (United States)

    Taha, Nashrawan; Cox, Andrew

    2016-01-01

    The great influx of international students into UK universities has led to internationalisation becoming an important issue. Previous studies have focused on the integration of home and international students, illustrating a lack of intercultural interaction. Yet there has been a lack of research investigating international students' networks and…

  20. Study Abroad Ghana: An International Experiential Learning

    Science.gov (United States)

    Boateng, Alice; Thompson, Abigail Mercy

    2013-01-01

    The global nature of social problems indicates how important it is for social workers to be involved in international issues. For example, overseas experience in social work programs is in consonance with the Council on Social Work Education's emphasis on global context of social work practice. In view of this, some schools of social work are…

  1. Study Abroad Ghana: An International Experiential Learning

    Science.gov (United States)

    Boateng, Alice; Thompson, Abigail Mercy

    2013-01-01

    The global nature of social problems indicates how important it is for social workers to be involved in international issues. For example, overseas experience in social work programs is in consonance with the Council on Social Work Education's emphasis on global context of social work practice. In view of this, some schools of social work are…

  2. Asia-Pacific Center for Security Studies, Annual Report 2009

    Science.gov (United States)

    2009-01-01

    Australia Papua New Guinea Solomon Islands Fiji Tuvalu Marshall Islands Micronesia Guam Palau Rep. of Korea TongaVanuatu Madagascar...International financial crisis Global warning/ climate change Pandemic disease Drug trafficking Illegal migration Piracy Terrorism Arms smuggling Illegal...Resource scarcity/rivalry Global warming/ climate change Drug trafficing Illegal fishing Crime Territorial disputes Pandemic disease

  3. An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Sanquist, Thomas F.; Mahy, Heidi A.; Morris, Fred A.

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used to measure attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis yielded a two factor solution, with the rating scale loading pattern suggesting factors of Perceived Effectiveness and Perceived Intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors, which were used to rank the systems in terms of overall acceptability. Difference scores for the rating scales and PCA factors were used to compute a single acceptability value reflecting the relative weight of risks and benefits. Of the 12 systems studied, airport screening, canine detectors and radiation monitoring at borders were found to be relatively acceptable, i.e., the perceived benefits for homeland security outweighed the perceived risks to civil liberties. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies, and can be used to anticipate potentially significant public acceptance issues.

  4. 8th International Symposium on Intelligent Distributed Computing & Workshop on Cyber Security and Resilience of Large-Scale Systems & 6th International Workshop on Multi-Agent Systems Technology and Semantics

    CERN Document Server

    Braubach, Lars; Venticinque, Salvatore; Badica, Costin

    2015-01-01

    This book represents the combined peer-reviewed proceedings of the Eight International Symposium on Intelligent Distributed Computing - IDC'2014, of the Workshop on Cyber Security and Resilience of Large-Scale Systems - WSRL-2014, and of the Sixth International Workshop on Multi-Agent Systems Technology and Semantics- MASTS-2014. All the events were held in Madrid, Spain, during September 3-5, 2014. The 47 contributions published in this book address several topics related to theory and applications of the intelligent distributed computing and multi-agent systems, including: agent-based data processing, ambient intelligence, collaborative systems, cryptography and security, distributed algorithms, grid and cloud computing, information extraction, knowledge management, big data and ontologies, social networks, swarm intelligence or videogames amongst others.

  5. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  6. Comparative International Air Cargo Solutions: The Pathway to a Resilient, Adaptable, Balanced and Sustainable Secure Global Air Cargo Supply Chain

    Science.gov (United States)

    2013-12-01

    systems. Dr. Gerald L. Dillinham, the Director of Physical Infrastructure Issues, GAO noted during his testimony that securing the nation’s aviation...9697. Karp , Aaron. “Air Cargo Flattens Out.” Air Transport World 46, no. 1 (2009): 37–39. 74 Kersey, J. W. “The Economics of Air Cargo (Analysis of...Transportation, U.S. Senate. Aviation Security: Progress since September 11, 2001, and the Challenges Ahead. Statement of Gerald L. Dillingham

  7. Security in the Third World

    OpenAIRE

    Özgediz, Gülden

    2004-01-01

    Ankara : The Department of International Relations, Bilkent Univ., 2004. Thesis (Master's) -- Bilkent University, 2004. Includes bibliographical references leaves 134-144. This thesis traces the development of thinking about security in the Third World from its Cold War past to its post-Cold War present. For this purpose, it examines three main approaches (traditional. Third World and critical) to the study of security in the Third World. It begins with a critical overview o...

  8. Guidelines for contingency planning NASA (National Aeronautics and Space Administration) ADP security risk reduction decision studies

    Science.gov (United States)

    Tompkins, F. G.

    1984-01-01

    Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.

  9. Why or Maybe Why Not Have an Alliance! - Case Studies of the Security Industry

    OpenAIRE

    Pierce, Paul

    2007-01-01

    Throughout the fall of 2006 and spring of 2007, more than 60 interviews were conducted on the topics of alliance and network building within the security industry. The interviews coupled with studies of academic research on the matter resulted in a number of pros and cons for alliance building as well as some general knowledge on the topic. The strongest facilitator for alliance building within the security industry has proven to be interpersonal relations as well as trust.

  10. Health Information Security: A Case Study of Three Selected Medical Centers in Iran

    OpenAIRE

    Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas

    2013-01-01

    Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients? electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that secur...

  11. Management of information security risks in a federal public institution: a case study

    OpenAIRE

    Jackson Gomes Soares Souza; Carlos Hideo Arima; Renata Maria Nogueira de Oliveira; Getulio Akabane; Napoleão Verardi Galegale

    2016-01-01

    Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T.) managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and thei...

  12. China’s Naval Policy Off The Coast Of Somalia International Participation, the Preservation of Strategic Interests, or Security?

    Directory of Open Access Journals (Sweden)

    Dr. Jean-Paul Gagnon

    2011-07-01

    Full Text Available This work will try to analyse China’s naval policy off the Somali coast. The maincontribution this work will attempt to make is to offer evidence concerningwhether China’s anti-pirating policies in the Gulf of Aden are more for thebenefit of the international community, China’s own strategic interest (apolitical economy outlook, or diplomatic growth. This work may be importantas it could contribute to our understanding of China’s current foreign policy toa slightly better degree. This will be attempted in the first instance by analysingthe literature concerning China’s humanitarian policies in Africa to establish asense of the literature on this subject. In the second instance, we will examinethe official foreign policy stance provided to the international community bythe current administration in China. And finally, in the third instance, we willcomparatively analyse if the policy statement is logically compatible with theextant literature. The analytical structure used to do so is Charmaz’s (2006grounded theory methodology. This study shows that China’s foreign navalpolicy off the coast of Somalia is probably a mix of humanitarian, economic,and international diplomatic goals.

  13. International Cooperation of Cyber Security and Its Value to China%国际网络安全合作及对中国的启示

    Institute of Scientific and Technical Information of China (English)

    丛培影

    2012-01-01

    In the context of globalization and with the wide application and rapid development of cyber information tech- nology, cyber information security has become a new focus of attention for many countries. Non-traditional security issues, such as cyber warfare, cyber terrorism and cyber crime, demand global cooperation due to their transnational character, com- plexity, and destructiveness. Cooperation of international cyber security will inevitably prevail. It has become a realistic prob- lem all countries are facing to tackle the challenges and difficulties in the cooperation. For China, a great power in information industry, to better participate in the cooperation of international cyber security will contribute positively to the protection of state interests and the construction of international regime.%在全球化的背景下,随着网络信息技术的广泛应用与快速发展,各国将对安全的关注转向了网络信息领域。网络战、网络恐怖主义、网络犯罪等非传统安全问题,因其跨国性、复合性、破坏性等特点,需要各国开展合作共同应对。国际网络安全合作已经成为一种必然趋势,应对合作中的挑战与难题成为各国面临的现实问题。如何有效使用网络外交方式维护本国国家利益、努力参与国际网络安全合作以及国际机制建设,对于作为信息大国的中国来说,具有积极的意义。

  14. Household food security status in the Northeast of Iran: a cross-sectional study.

    Science.gov (United States)

    Gholami, Ali; Foroozanfar, Zohre

    2015-01-01

    An important issue the world faces today is ensuring that households living in different countries have access to enough food to maintain a healthy life. Food insecurity is prevalent in both developed and developing countries. The objective of this study was to assess the household food security status and related factors among different rural districts of Neyshabur (A city in northeast of Iran). Of 5000 selected rural households 4647 were studied in this cross-sectional study. A validated short questionnaire (with six questions) was used to measure food security. Chi-square test and logistic regression were used for data analysis through SPSS software. In total, 2747 households (59.1%) were identified as food secure. The highest prevalence of food security was observed in Central district (62.3%) and the lowest was in Miyanjolgeh district (52.9%). Backward multiple logistic regression revealed that car ownership, presence of chronic disease in household and household income (per month) were significantly associated with food security in all of surveyed districts (pfood secure and economic variables were the most important factors. Therefore, a special attention should be paid to this health problem in these regions.

  15. Study on the adverse effects of hydropower development on international shipping

    Science.gov (United States)

    Wang, Changhong

    2017-04-01

    The Lancang - Mekong river is an important international waterway to Southeast Asia and South Asia, which has important strategic significance for promoting regional economic cooperation and safeguarding national economic and security interests. On the Mekong River, the main aim is to develop hydropower resources utilization and shipping. River Hydropower Stations are in Laos and designed by foreign enterprises according to the construction of BOT. In this study, on the basis of a lot of research work and extensive collection of relevant information, and, through in-depth analysis of research, it reveals that the upper Mekong River hydropower development have many adverse effects on international shipping, put forward related suggestions for the healthy and sustainable development of international shipping.

  16. Factors associated with pharmacy student interest in international study

    National Research Council Canada - National Science Library

    Owen, Chelsea; Breheny, Patrick; Ingram, Richard; Pfeifle, William; Cain, Jeff; Ryan, Melody

    2013-01-01

      To examine the interest of pharmacy students in international study, the demographic factors and involvement characteristics associated with that interest, and the perceived advantages and barriers...

  17. The Treatment of Peace and Security Issues in Social Studies Textbooks in the United States.

    Science.gov (United States)

    Fleming, Dan B.

    This examination of the treatment given to peace and security issues in American social studies textbooks begins by summarizing the National Council for the Social Studies (NCSS) Curriculum Guidelines and a 1983 study of high school social studies topic priorities. Following a review of past textbook studies and a brief discussion of textbook…

  18. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  19. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  20. Key Factors in the Success of an Organization's Information Security Culture: A Quantitative Study and Analysis

    Science.gov (United States)

    Pierce, Robert E.

    2012-01-01

    This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…

  1. Key Factors in the Success of an Organization's Information Security Culture: A Quantitative Study and Analysis

    Science.gov (United States)

    Pierce, Robert E.

    2012-01-01

    This research study reviewed relative literature on information security and information security culture within organizations to determine what factors potentially assist an organization in implementing, integrating, and maintaining a successful organizational information security culture. Based on this review of literature, five key factors were…

  2. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  3. Moving from Requirements to Design Confronting Security Issues: A Case Study

    Science.gov (United States)

    Halkidis, Spyros T.; Chatzigeorgiou, Alexander; Stephanides, George

    Since the emergence of software security as a research area, it has been evident that security should be incorporated as early as possible in the software lifecycle. The advantage is that large gains can be achieved in terms of cost and effort compared to the introduction of security as an afterthought. The earliest possible phase to consider possible attacks is during requirements specification. A widely accepted approach to consider security in the requirements is the employment of misuse cases. In this paper we examine a case study to automatically generate a class diagram, based on the use and misuse cases present in the requirements. Particularly, we extend a natural language processing approach to move beyond a general domain model and produce a detailed class diagram. Moreover, security patterns are introduced in appropriate places of the design to confront the documented attacks and protect the threatened resources. Additionally, we perform an experimental study to investigate the tradeoff between the additional effort to mitigate the attacks and the security risk of the resulting system. Finally, the optimization problem of finding the smallest system regarding additional effort given a maximum acceptable risk is established and an appropriate algorithm to solve it is proposed.

  4. International photonics training: a case study

    Science.gov (United States)

    Sporea, Dan; Massa, Nicholas; Donnelly, Judith F.; Hanes, Fenna

    2007-06-01

    From 2004, the Center for Science Education and Training (CSET) participated to the European Union-funded educational network "Hands-on Science". The aim of the Romanian team was to transform teachers and students from end-users of educational aids to active designers and developers of instructional materials. Several science fields were identified, including photonics. The team at CSET is now focusing on: lasers and their applications, optical fiber communications, solar energy as a sustainable source, and the use of optical spectroscopy in physics and chemistry. CSET initiated an international collaboration with the New England Board of Higher Education (NEBHE) in Boston, Mass., when the Center enrolled an experienced Romanian high school science teacher in a twelve-week "Introduction to Photonics" laboratory-based professional development course. The course was developed by NEBHE through an Advanced Technological Education (ATE) program grant from National Science Foundation and is designed for high school and community college educators from both science and technology instructional areas. The paper reports the experience of this international participation which was made possible since the course is delivered via the Internet by Three Rivers Community College, Norwich, Conn. Its impact on photonics education in Romania and the USA is analyzed, as the participant teacher shares her experiences with teachers and faculty in the "Introduction to Photonics" course and with those enrolled into the Romanian "Hands-on-Science" program.

  5. A Qualitative Study of Health Care Experiences Among International Students.

    Science.gov (United States)

    Anderson, Anna; Kitsos, Jewel; Miller, Andrea; Abraham, Sam

    The purpose of this qualitative study was to explore the health care experiences of international students at a college in Indiana. The study answered the following research question: What are the lived experiences of international students while seeking health care? This research question was identified after a literature review, which showed a lack of research regarding international students' health care experiences. The data in this study were collected through in-depth interviews with 5 participants who resided at the college. After the interviews, the identification of themes and the analysis of results revealed the international students' lived experiences and perceptions of health care in the United States.

  6. Study on Web Services Security Mechanism%Web Services 安全机制研究

    Institute of Scientific and Technical Information of China (English)

    张锋军; 李勇; 牟其林

    2014-01-01

    Web services, as a mainstream technical standard for SOA implementation, has now been ap-plied extensively, and its security is worthy of high attention. This paper studies the security mechanism of Web services based-on the WS-security standards, analyses the standards it follows, and describes the function of security services. It gives an applicable Web services protection solution from the aspects of i-dentification, SOAP message security and access control based on engineer practice. This solution can im-plement the core security protection functions of Web services, and has directive significance for Web serv-ices-based SOA system's security protection.%Web Services 作为实现 SOA 的主流技术标准,得到了广泛应用,其安全性值得高度关注。基于 WS-Security 标准,对 Web Services 的安全机制进行了研究,对 Web Services 安全防护的功能、遵循的标准进行了分析,并结合工程实践,从身份识别、SOAP 消息安全防护和访问控制等方面提出了Web Services 安全防护的实现方案,可以实现核心的安全防护功能,对基于 Web Services 技术架构的系统安全防护具有指导意义。

  7. Return to work after renal transplantation: a study of the Brazilian Public Social Security System.

    Science.gov (United States)

    Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D

    2014-12-15

    Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.

  8. Health information security: a case study of three selected medical centers in iran.

    Science.gov (United States)

    Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas

    2013-03-01

    Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.

  9. Securing Security Governance in Post-conflict Situation : A Framework of Conflict Prevention through ECOWARN in West African Region

    OpenAIRE

    Yamane, Tatsuo

    2013-01-01

    This article focuses on an analytical approach of “security governance” in light of post-conflict situation and aims to examine a system of conflict prevention in the West African region from a viewpoint of the approach. The security governance initially developed security studies of International Relations especially for the regional governance in the field of European security. On that basis of making and developing the new perspective for the region, it currently goes to expand the subject...

  10. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  11. Independent Senior Women Who Travel Internationally: A Collective Case Study

    Science.gov (United States)

    Jarrett, Barbara

    2010-01-01

    Nine independent women over age 55 who traveled internationally were investigated through a qualitative case study. The purpose of the study was to explore the women's attitudes, actions, and motivations during and after their international travel experiences. The adult, aging, experiential, and transformational theories of researchers such as…

  12. International Dimensions in the Social Studies. 38th Yearbook.

    Science.gov (United States)

    Becker, James M.; Mehlinger, Howard D.

    This thirty-eighth yearbook provides a framework for the teaching of international education and relates recent concepts and ideas in the international studies field which are applicable to the teaching of social studies. A number of educators and social scientists contributed to a series of chapters comprised in four sections of the volume. Each…

  13. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  14. Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies

    Directory of Open Access Journals (Sweden)

    Paulina Silva

    2016-12-01

    Full Text Available Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC; while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.

  15. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  16. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  17. Homeland Security and Information.

    Science.gov (United States)

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  18. Crayons and security

    OpenAIRE

    Sue Dwyer

    1999-01-01

    Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  19. Crayons and security

    Directory of Open Access Journals (Sweden)

    Sue Dwyer

    1999-04-01

    Full Text Available Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  20. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  1. A nova agenda internacional de segurança põe a democracia brasileira em risco? Does the new international security agenda endanger Brazilian democracy?

    Directory of Open Access Journals (Sweden)

    Juliana Bertazzo

    2007-12-01

    Full Text Available Agenda Internacional de Segurança mudou após o fim da Guerra Fria. Surgiram novas ameaças, frequentemente domésticas, que vão de encontro às tradicionais teorias de segurança. Este artigo analisa documentos oficiais produzidos por atores nacionais e internacionais. É possível concluir que existem incentivos políticos e jurídicos para a participação de militares em atividades policiais. Essa participação, contudo, pode apresentar riscos para a democracia.The international security agenda in the Post-Cold War world has changed. New threats, mostly internal, rather than external, have gained importance and challenge traditional theories of security. This article analyzes official documents produced by national and international actors. It is possible to identify political and legal incentives for the participation of military forces in police activities. This, however, might endanger a democratic regime.

  2. Study on Information Security and e-Trust in Spanish households

    Science.gov (United States)

    Aguado, José

    The study on Information Security and e-Trust in Spanish households has been conducted by INTECO (The National Institute of Communication Technologies) through the Information Security Observatory. It is a study on the incidence and trust of users in the Internet by means of measuring the frequency of the episodes of individual risk in a wide sample of users that are monitored online on a monthly basis, combining quantitative data of incidences (monthly scans of home computers) and qualitative perception data (quarterly surveys). The study is supplied with data from more than 3,000 households with Internet connection, spread across the whole country.

  3. Indicators of food and water security in an Arctic Health context – results from an international workshop discussion

    Directory of Open Access Journals (Sweden)

    Lena Maria Nilsson

    2013-08-01

    Full Text Available In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  4. Indicators of food and water security in an Arctic Health context--results from an international workshop discussion.

    Science.gov (United States)

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  5. Cultural Dimension of International Relations During Interwar Period: International Institute for Intellectual Cooperation and the Scientific Study of International Relations

    Directory of Open Access Journals (Sweden)

    Anişoara Popa

    2014-12-01

    Full Text Available Our understanding of the past is highly influenced/leaded by the “lens” (readings, ideologies, etc. that have guided us through approaching realities of a specific period of time. In this article, we will discuss the cultural dimension of international relations characteristic for the interwar period , emphasizing , while tracing back on Romanian historiography, the aspects regarding the role that the International Institute of Intellectual Cooperation had in organizing the scientifically study of IR and the specific participation of Romania within this League of Nations‘ body activity.

  6. Evaluation of the central libraries information security management at governmental universities located in Tehran, according to the international standard ISO/IEC 27002

    Directory of Open Access Journals (Sweden)

    Milad Malekolkalami

    2014-02-01

    Full Text Available This study assessed the evaluation of information security management status in central Libraries of governmental universities located in Tehran, according to ISO / I.E.C. 27002. Research method applied for the study is descriptive Survey and a questionnaire was used for collecting information. The questionnaire was distributed between the 74 central library managers of governmental universities in Tehran according to the recent list on the website of Ministry of Science, Research and Technology, that includes 39 components based on 11 indicators of the standard ISO/ I.E.C. 27002. Analysis of data has been done by using both descriptive and inferential statistics by Microsoft Excel 2007and SPSS statistical softwares. The results of research showed that the mean for libraries in 11 indexes are as follows: The mean for the first index, Security policy, is 3.91 , in the second index, organization of information security, is 4.23, in the third index, asset security management, is 4.38, in the fourth index, Human Resources Security management, is 4, in the fifth index, physical and environment Security management, is 4.07, in the sixth index, operations management and communications, is 4.15, in the Seventh index, access controls management, is 4.38, in the eighth index, information system acquisition, development and maintenance, is 3.92, in the ninth index, information security incident management, is 3.84, in the tenth index, business continuity management, is 3.46, in the eleventh index, compliance, is 3.69 that match with the standard ISO / IEC. 27002. The results of Research shown that totally mean for standard ISO/I.E.C. 27002 in the field of information security management in the central libraries, is 4 being in a good condition and there is no significant differences between the performance of the Central libraries of the governmental Universities in Tehran, since It is not observed significant difference between them in the field of

  7. DIVERGENCE OF FOOD AND NUTRITIONAL SECURITY- A STUDY ON WESTERN ODISHA

    Directory of Open Access Journals (Sweden)

    Digambar Chand

    2016-01-01

    Full Text Available Food security and nutritional security are the subsets of livelihood security. Poor nutritional outcomes of infants and children arise from the poor health status of women, overall poverty, lack of hygiene and inadequate health facilities. The study discusses the divergence between food security and nutritional security in the state as a whole and the region in particular.A multi stage random sampling technique has been adopted for the collection of data.Statistical analysis used for drawing valid inferences are testing of hypothesis, chi square test, regression analysis and fitting of trend lines. In the present study an attempt has been made to address the issues namely: i incidence of malnutrition and food insecurity through three critical links viz. children, adolescent girls and women, ii surplus/deficit of production of cereals, pulses, food grains and oilseeds as per requirement iii trends of production and availability of secondary diets such as egg, meat, fish and milk iv indicators of malnutrition. Production must be diversified from cereal crop production like paddy to other crops.A life-cycle approach to management was adopted that integrates strategy, people resources, processes and measurements to improve.

  8. After Halliburton: Event Studies and Their Role in Federal Securities Fraud Litigation

    NARCIS (Netherlands)

    J.E. Fisch (Jill); J.B. Gelbach (Jonah); J.M. Klick (Jonathan)

    2016-01-01

    markdownabstractEvent studies have become increasingly important in securities fraud litigation after the Supreme Court’s decision in Halliburton II. Litigants have used event study methodology, which empirically analyzes the relationship between the disclosure of corporate information and the issue

  9. Motivating the Study of International Trade: A Classroom Activity

    Science.gov (United States)

    Jensen, Sherry

    2016-01-01

    In this article, the author describes a classroom activity for use in introductory economics courses to motivate the study of international trade. The learning activity highlights the importance of international trade in students' everyday lives by having students inventory their on-hand belongings and identify where the items were manufactured.…

  10. Effectively Integrating an International Field Study into the EMBA Curriculum

    Science.gov (United States)

    Cotner, John; Jones, Raymond; Kashlak, Roger

    2003-01-01

    An international field study (IFS) is an integral part of the EMBA program because of the various critical roles it plays. This international travel experience is a value-added activity not only as "stand alone" vehicle for understanding macro-level environments and firm-level strategic initiatives, but also as a tool that integrates other pieces…

  11. Integrating Material on the Internment into Anthropology and Women's Studies.

    Science.gov (United States)

    Sacks, Karen B.

    1993-01-01

    Describes plans to use material from a seminar on integrating material about the Japanese-American internment in World War II into the curriculum of the University of California Los Angeles. Describes efforts to develop a unit on the gender and racial dimensions of internment for a women's studies course. (SLD)

  12. Cosmos, an international center for advanced studies

    Science.gov (United States)

    Ryzhov, Iurii; Alifanov, Oleg; Sadin, Stanley; Coleman, Paul

    1990-01-01

    The concept of Cosmos, a Soviet operating center for aerospace activities, is presented. The main Cosmos participants are the Institute for Aerospace Education, the Institute for Research and Commercial Development, and the Department of Space Policy and Socio-Economic Studies. Cosmos sponsors a number of educational programs, basic research, and studies of the social impact of space-related technologies.

  13. Factors associated with pharmacy student interest in international study.

    Science.gov (United States)

    Owen, Chelsea; Breheny, Patrick; Ingram, Richard; Pfeifle, William; Cain, Jeff; Ryan, Melody

    2013-04-12

    OBJECTIVES. To examine the interest of pharmacy students in international study, the demographic factors and involvement characteristics associated with that interest, and the perceived advantages and barriers of engaging in international opportunities during pharmacy school. METHODS. A self-administered electronic survey instrument was distributed to first-, second-, and third-year pharmacy students at the University of Kentucky College of Pharmacy. RESULTS. There were 192 total respondents, for a response rate of 50.9%. Seventy-two percent reported interest in international study. Previous international study experience (p=0.001), previous international travel experience (p=0.002), year in pharmacy school (p=0.03), level of academic involvement (pinternational study interest. Positive influences to international study included desire to travel and availability of scholarships. Perceived barriers included an inability to pay expenses and lack of foreign language knowledge. CONCLUSIONS. The needs and interests of pharmacy students should be considered in the development and expansion of internationalization programs in order to effectively optimize global partnerships and available international experiences. Colleges and schools of pharmacy should engage students early in the curriculum when interest in study-abroad opportunities is highest and seek to alleviate concerns about expenses as a primary influence on study-abroad decisions through provision of financial assistance.

  14. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  15. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  16. Work ability and health of security guards at a public University: a cross-sectional study 1

    Science.gov (United States)

    Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante

    2016-01-01

    Abstract Objective: to evaluate the work ability and health status of security guards at a public University. Methods: a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. Results: samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). Conclusion: this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged. PMID:27463107

  17. The doctrine of human security in Canadian foreign policy: Lloyd Axworthy’s contribution to the study of world policy

    Directory of Open Access Journals (Sweden)

    Jonathan Ortiz Navarrete

    2003-01-01

    Full Text Available The multitude of changes on the international scene during the 1990’s had a major impact on thinking in the area of international relations as well as on the foreign policy decision-making processes of all nation states. One of the most difficult issues to redefine and to give a meaning appropriate to the international needs of the moment was that of security. Lloyd Axworthy, Canada’s Minister of Foreign Affairs from 1996 to 2000, convinced that, with the end of bipolarity, the challenges to security had moved from the level of states to concerns more closely related to the well-being of individuals, undertook the task of promoting, as part of his country’s foreign policy, the concept of human security.

  18. Managing East Asia’s Political and Security Risks: From the Perspective of Transition of International Order

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In the sixty years after World War II, albeit with unceasing local conflicts, Asia as a whole moved into a relatively stable period of peace. It has been also a period of the most rapid and sound development in history indeed. However, the international order has broken down, and it is in a historical transition period. Different from the transition of international order at

  19. Rossijskaja jenergeticheskaja diplomatija i mezhdunarodnaja jenergeticheskaja bezopasnost' (geopolitika i jekonomika [Russian energy diplomacy and international energy security (geopolitics and economics

    Directory of Open Access Journals (Sweden)

    Zhiznin Stanislav

    2010-01-01

    Full Text Available This article considers national energy security as a component of foreign policy and diplomacy and analyses the current state of Russian energy policy, the role of Russia in global energy geopolitics and the factors affecting it. The author examines energy diplomacy as an instrument of foreign policy at both global and regional levels taking into account the changes in the corporate policy of energy companies.

  20. Rossijskaja jenergeticheskaja diplomatija i mezhdunarodnaja jenergeticheskaja bezopasnost' (geopolitika i jekonomika) [Russian energy diplomacy and international energy security (geopolitics and economics)

    OpenAIRE

    Zhiznin Stanislav

    2010-01-01

    This article considers national energy security as a component of foreign policy and diplomacy and analyses the current state of Russian energy policy, the role of Russia in global energy geopolitics and the factors affecting it. The author examines energy diplomacy as an instrument of foreign policy at both global and regional levels taking into account the changes in the corporate policy of energy companies.

  1. Indicators of food and water security in an Arctic Health context – results from an international workshop discussion

    OpenAIRE

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A.; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan J.; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of th...

  2. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  3. College law enforcement and security department responses to alcohol-related incidents: a national study.

    Science.gov (United States)

    Bernat, Debra H; Lenk, Kathleen M; Nelson, Toben F; Winters, Ken C; Toomey, Traci L

    2014-08-01

    Campus police and security personnel are often the first to respond to alcohol-related incidents on campus. The purpose of this study is to examine how campus law enforcement and security respond to alcohol-related incidents, and how consequences and communication differ based on characteristics of the incident. Directors of campus police/security from 343 colleges across the United States completed a survey regarding usual practice following serious, underage, and less serious alcohol incidents on and off campus. Campus law enforcement and security most commonly reported contacting campus officials. A minority reported issuing citations and referring students to the health center. Enforcement actions were more commonly reported for serious and underage incidents than for less serious incidents. Large (vs. small) colleges, public (vs. private) colleges, and those located in small (vs. large) towns more consistently reported taking actions against drinkers. Understanding how campus police and security respond to alcohol-related incidents is essential for reducing alcohol-related problems on college campuses. Copyright © 2014 by the Research Society on Alcoholism.

  4. Building International Sustainable Partnerships in Occupational Therapy: A Case Study.

    Science.gov (United States)

    Tupe, Debra Ann; Kern, Stephen B; Salvant, Sabrina; Talero, Pamela

    2015-09-01

    Occupational therapy practitioners frequently identify opportunities for international practice. The World Health Organization and the World Federation of Occupational Therapists have encouraged occupational therapists to address transnational issues, social inclusion, and equal access to opportunities grounded in meaningful occupation (WFOT, 2012). This case study describes a partnership between two U.S. schools of occupational therapy and a Cuban community based pediatric clinic. It examines the dynamics that have sustained the partnership despite political, economic, and logistical barriers. The literature is scrutinized to show how this case study fits into other accounts of collaborative international partnerships. Particularly, it investigates structural and institutional conditions that shape international sustainable partnerships. In doing so, we answer the following questions: (1) Under which circumstances do international partnerships emerge and flourish? (2) What structural and institutional conditions shape international sustainable partnerships? And (3) How do partners perceive and experience the bilateral international partnership? It also discusses and illustrates the foundations and development of international partnerships that succeed. Through the use of a case study we illustrate the development of this partnership. Finally, we consider the next steps of this particular sustainable and collaborative international partnership.

  5. Using Botnets to provide security for safety critical embedded systems - a case study focused on UAVs

    Science.gov (United States)

    Garcia Muzzi, Fernando Augusto; Rogério de Mello Cardoso, Paulo; Pigatto, Daniel Fernando; Jaquie Castelo Branco, Kalinka Regina Lucas

    2015-09-01

    The use of unmanned aerial vehicles (UAV s) has been growing not only in military applications, but also in civilian. UAVs have enormous potential for use, which mostly still are unexplored. For the use of UAV s in the airspace, not only Brazilian new studies on methods of analysis and technologies should be incorporated into navigation systems, control among others, promoting security mechanisms for these aircraft. Implement security mechanisms using a platform with operating systems and botnet to simulate such attack Distributed Denial of Service (DDoS) in UAVs is an important task when it is aimed at containment and mitigation of attacks on this type of platform.

  6. A Comprehensive Study about Cloud Computing Security: Issues, Applications and Challenges

    Directory of Open Access Journals (Sweden)

    Sima Ghoflgary

    2014-11-01

    Full Text Available Cloud computing provides facilities for users to save their data or information in servers which are connected through Internet or Intranet. Further, users can run their applications with the help of software provided by cloud computing servers without installing that software in their own personal computers. Since many users access to cloud computing servers for various goals, therefore one of the main problem in this regard is providing security in access, usage, share or running users’ programs by cloud computing sources or servers. This paper attempts to study security issues, applications and its challenges on cloud computing

  7. Vergelijkende studie van security in web-CMS'en

    OpenAIRE

    Bottelbergs, Steve

    2013-01-01

    Deze masterproef vergelijkt de drie meest gebruikte open source web content management systemen met elkaar op basis van een aantal objectieve criteria. Hiermee wordt getracht de onderzoeksvraag "hoe veilig zijn open source web content management systemen" te beantwoorden. Het type masterproef is een vergelijkende studie.

  8. Constructing Affective Security in Children: Case Study in Educational Environments

    Science.gov (United States)

    Margenat, Montserrat; Dalmau, Mariona; Vendrell, Roser; Ibarz, Lidia

    2016-01-01

    In line with Bowlby's theoretical approach, where he established a relationship between the quality of experiences lived in the first relationships and subsequent behaviours, we are carrying out a case study research project. The objectives are as follows: (1) To describe interactive patterns as observed in natural contexts and focusing on the…

  9. Constructing Affective Security in Children: Case Study in Educational Environments

    Science.gov (United States)

    Margenat, Montserrat; Dalmau, Mariona; Vendrell, Roser; Ibarz, Lidia

    2016-01-01

    In line with Bowlby's theoretical approach, where he established a relationship between the quality of experiences lived in the first relationships and subsequent behaviours, we are carrying out a case study research project. The objectives are as follows: (1) To describe interactive patterns as observed in natural contexts and focusing on the…

  10. INTERNAL GOVERNANCE AND ROLE OF INTERNAL AUDIT IN FINANCIAL INSTITUTIONS. CASE STUDY: RISK BASED PLANNING

    Directory of Open Access Journals (Sweden)

    Andrei Florin

    2015-07-01

    Full Text Available The global financial crisis from 2008 was considered a trigger to reshape the financial systems and to enhance the risk management practices. Considering the developments and new guidelines that are now used it can be observed a “positive” effect of the crisis, in particular to strengthen the risk management culture and governance in all aspects. Comparing to 2008 year, the improvements that have been made to the risk management systems can be easily observed in the financial institutions. For the scope of the article, the subject of this review will be focused on the internal audit function. The main aspect is to capture the new practices that are now used in order to contribute to a performing internal governance system. A case study will be presented in order to better understand how the internal audit function is designed and acting as a “line” of defence in the internal governance system. Also, it is in the scope of the article to issue some recommendations for future developments of the audit function in order to better manage its mission and the objectives. A risk based model used in the planning activities is presented. The financial institutions improved significantly their internal governance system. The internal audit function is now better integrated in the internal structures and clear lines of communication were settled. As the conclusion of the article is illustrating, the internal governance was frequently not sufficiently developed causing a failure in the risk management systems from the systemically financial institutions. The content of the article has practical applicability, as the results and the recommendations could be used in the design of an audit function within a financial institution.

  11. Islamic movement and human rights: Pertubuhan Jamaah Islah Malaysia’s involvement in the “Abolish Internal Security Act Movement,” 2000-2012

    Directory of Open Access Journals (Sweden)

    Maszlee Malik

    2014-12-01

    Full Text Available Human rights has been acknowledged as one of the essential characteristics of good governance. Abuse of human rights is strongly associated with bad governance, which is believed by many to be a serious impediment to development and sustainable growth. Despite the active participations of Islamic movements in many parts of the political world, very little is known of their involvement in advocating human rights issues as part of their struggle for power. Nevertheless, as an Islamic movement and an Islamic revivalism actor in Malaysia, Pertubuhan Jamaah Islah Malaysia (JIM has shown otherwise. JIM has resembled a different attitude towards the issue of human rights that they believe as an integrated and pertinent composition of good governance. By scrutinising their political activities and discourse since 2000, it becomes clear that JIM has been actively engaged in good governance and human rights issues, especially those that relate to the political rights of citizens through its involvement in the Abolish Internal Security Act (ISA Movement (Gerakan Mansuhkan ISA. This paper examines JIM’s involvement in human rights issues with a special focus on its active and leading role in calling for the abolishment of the Internal Security Act (ISA.

  12. The Circle Of Security Parenting and parental conflict: a single case study

    Directory of Open Access Journals (Sweden)

    Chiara ePazzagli

    2014-08-01

    Full Text Available The Circle of Security Parenting (COS-P is an early attachment based intervention that can be used with groups, dyads, and individuals. Created in the USA and now used in many countries, COS-P is a visually based approach that demonstrates its central principles through videos of parent/child interactions. The core purpose of the COS-P is to provide an opportunity for caregivers to reflect on their child’s needs and on the challenges each parent faces in meeting those needs. Even though there is a wide range of clinical settings in which child/parent attachment is an important component of assessment there is limited empirical data on when and how attachment based interventions are appropriate for specific clinical profiles and contexts. The aim of this paper is to present a clinical application of COS-P in order to explore and reflect on some specific therapeutic tasks where it works and on some clinical indicators and contexts appropriate for its application. A single case study of a father, M. (43 yrs. old in conflict for the custody of his 5yrs old daughter is reported. The Adult Attachment Projective Picture System (AAP, the Parenting Stress Index, the Strengths and Difficulties Questionnaire, and the Parental Alliance Measure, were administered pre- and post-intervention. The clinical significance analysis method revealed that numerous changes occurred in the father. The AAP showed improvements in the level of agency of self. M. made gains in his capacity to use internal resources and to increase his agency of self. M. was classified as recovered in his perception of the child’s functioning and as improved in his parenting stress and parenting alliance with the mother. Considerations on specific contexts and clinical indicators for the application of COS-P are proposed.

  13. The circle of security parenting and parental conflict: a single case study.

    Science.gov (United States)

    Pazzagli, Chiara; Laghezza, Loredana; Manaresi, Francesca; Mazzeschi, Claudia; Powell, Bert

    2014-01-01

    The Circle of Security Parenting (COS-P) is an early attachment based intervention that can be used with groups, dyads, and individuals. Created in the USA and now used in many countries, COS-P is a visually based approach that demonstrates its central principles through videos of parent/child interactions. The core purpose of the COS-P is to provide an opportunity for caregivers to reflect on their child's needs and on the challenges each parent faces in meeting those needs. Even though there is a wide range of clinical settings in which child/parent attachment is an important component of assessment there is limited empirical data on when and how attachment based interventions are appropriate for specific clinical profiles and contexts. The aim of this paper is to present a clinical application of COS-P in order to explore and reflect on some specific therapeutic tasks where it works and on some clinical indicators and contexts appropriate for its application. A single case study of a father, "M." (43 years old) in conflict for the custody of his 5 years old daughter is reported. The Adult Attachment Projective Picture System (AAP), the Parenting Stress Index, the Strengths and Difficulties Questionnaire, and the Parental Alliance Measure, were administered pre- and post-intervention. The clinical significance analysis method revealed that numerous changes occurred in the father. The AAP showed improvements in the level of agency of self. M. made gains in his capacity to use internal resources and to increase his agency of self. M. was classified as recovered in his perception of the child's functioning and as improved in his parenting stress and parenting alliance with the mother. Considerations on specific contexts and clinical indicators for the application of COS-P are proposed.

  14. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  15. International Engagement Strategy

    Science.gov (United States)

    2017-06-14

    INTERNATIONAL ENGAGEMENT STRATEGY STATEMENT OF PURPOSE The U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T... International Engagement Strategy is intended to establish clear goals and objectives to guide S&T’s international cooperative research, development... International Engagement Strategy, the 2015 White House National Security Strategy, the 2014 Quadrennial Homeland Security Review, and the DHS Fiscal

  16. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  17. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  18. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  19. Social Studies Education as a Panacea for National Security in Nigeria

    African Journals Online (AJOL)

    User

    2011-04-19

    Apr 19, 2011 ... therefore is to examine the role of social studies education in preparing the young people to .... remote causes of breach of peace and security, whether historical, religious, ... education reduction in certain inequalities in come distribution ... levels, rule of law, fighting corruption and improved transparency.

  20. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  1. IEA International Civic and Citizenship Education Study 2016 Assessment Framework

    National Research Council Canada - National Science Library

    Agrusti, Wolfram SchulzJohn AinleyJulian FraillonBruno LositoGabriella

    2016-01-01

    The International Civic and Citizenship Education Study (ICCS) investigates the ways in which young people are prepared to undertake their roles as citizens in a range of countries in the second decade of the 21st century...

  2. Study of Intelligent Secure Chemical Inventory Management System

    Science.gov (United States)

    Shukran, Mohd Afizi Mohd; Naim Abdullah, Muhammad; Nazri Ismail, Mohd; Maskat, Kamaruzaman; Isa, Mohd Rizal Mohd; Shahfee Ishak, Muhammad; Adib Khairuddin, Muhamad

    2017-08-01

    Chemical inventory management system has been experiencing a new revolution from traditional inventory system which is manual to an automated inventory management system. In this paper, some review of the classic and modern approaches to chemical inventory management system has been discussed. This paper also describe about both type of inventory management. After a comparative analysis of the traditional method and automated method, it can be said that both methods have some distinctive characteristics. Moreover, the automated inventory management method has higher accuracy of calculation because the calculations are handled by software, eliminating possible errors and saving time. The automated inventory system also allows users and administrators to track the availability, location and consumption of chemicals. The study of this paper can provide forceful review analysis support for the chemical inventory management related research.

  3. 76 FR 2353 - Office of Postsecondary Education; Overview Information; International Research and Studies (IRS...

    Science.gov (United States)

    2011-01-13

    ... IRS Program outreach activities conducted in the current reporting period. Efficiency Measure: Cost..., agency, institution, or organization, you can obtain a TIN from the Internal Revenue Service. If you are an individual, you can obtain a TIN from the Internal Revenue Service or the Social Security...

  4. Pengaruh Pemasaran Internal dan Kualitas Layanan Internal Terhadap Kepuasan Pelanggan Internal (Studi Pada Industri Kepariwisataan di Daerah Istimewa Yogyakarta)

    National Research Council Canada - National Science Library

    Jumadi Jumadi

    2016-01-01

    The aim of this research is to investigate the implication of internal marketing and internal service quality effectivity towards internal customer satisfaction in Tourism Industry in Yogyakarta Special Territory...

  5. Pengaruh Pemasaran Internal dan Kualitas Layanan Internal Terhadap Kepuasan Pelanggan Internal (Studi Pada Industri Kepariwisataan di Daerah Istimewa Yogyakarta)

    National Research Council Canada - National Science Library

    Jumadi

    2014-01-01

    The aim of this research is to investigate the implication of internal marketing and internal service quality effectivity towards internal customer satisfaction in Tourism Industry in Yogyakarta Special Territory...

  6. Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

    Science.gov (United States)

    Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M

    2017-05-17

    Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. About features of the system and process approaches creating ІТ projects in the field of information security

    OpenAIRE

    Kozhedub, Yuliya

    2015-01-01

    The article presents a summary theoretical study known scientific approaches to the creation of IT projects in the field of information security, which they introduce for information security systems. The study also was based on international instruments that they used experts in the field of information security. Generally accepted international practice of standardization and scientific approaches used during the creation of IT projects in the field of information security are the main fact...

  8. Water Security in the Syr Darya Basin

    Directory of Open Access Journals (Sweden)

    Kai Wegerich

    2015-08-01

    Full Text Available The importance of water security has gained prominence on the international water agenda, but the focus seems to be directed towards water demand. An essential element of water security is the functioning of public organizations responsible for water supply through direct and indirect security approaches. Despite this, there has been a tendency to overlook the water security strategies of these organizations as well as constraints on their operation. This paper discusses the critical role of water supply in achieving sustainable water security and presents two case studies from Central Asia on the management of water supply for irrigated agriculture. The analysis concludes that existing water supply bureaucracies need to be revitalized to effectively address key challenges in water security.

  9. An observational study of emergency department intern activities.

    Science.gov (United States)

    Zhu, Jia Ni; Weiland, Tracey J; Taylor, David M; Dent, Andrew W

    2008-05-05

    To describe how intern time is spent, and the frequency of activities performed by interns during emergency department (ED) rotations. Prospective observational study of 42 ED interns from three Melbourne city teaching hospitals during 5 months in 2006. Direct observations were made by a single researcher for 390.8 hours, sampling all days of the week and all hours of the day. Proportion of time spent on tasks and number of procedures performed or observed by interns. Direct patient-related tasks accounted for 86.6% of total intern time, including 43.9% spent on liaising and documentation, 17.5% obtaining patient histories, 9.3% on physical examinations, 5.6% on procedures, 4.8% ordering or interpreting investigations, 3.0% on handover and 4.9% on other clinical activities. Intern time spent on non-clinical activities included 4.2% on breaks, 3.7% on downtime, 1.7% on education, and 1.3% on teaching others. Adjusted for an 8-week term, the ED intern would take 253 patient histories, consult more senior ED staff on 683 occasions, perform 237 intravenous cannulations/phlebotomies, 39 arterial punctures, 12 wound repairs and apply 16 plasters. They would perform chest compressions under supervision on seven occasions, observe defibrillation twice and intubation once, but may not see a thoracostomy. The ED exposes interns to a broad range of activities. With the anticipated increase in intern numbers, dilution of the emergency medicine experience may occur, and requirements for supervision may increase. Substitution of ED rotations may deprive interns of a valuable learning experience.

  10. How international is internationally collaborated research? A bibliometric study of Russian surname holder collaboration networks

    Energy Technology Data Exchange (ETDEWEB)

    Karaulova, M.; Goek, A.; Shapira, P.

    2016-07-01

    International research performance indicators attain increased attention in science policy. They are seen to reflect relative competitiveness of a country in producing leading research (in terms of cited papers) and its commercialisation (in terms of assigned patents). However, more studies point to ongoing global bias in production, composition and assessment of research performance metrics (Rafols et al., 2012; van Leeuwen et al., 2001). As research performance indicators are used increasingly in national science policy and in influential international rankings, it is important to understand their inherent bias. For instance, explosive growth of international collaboration in science is widely reported (Glänzel, 2001), and is generally perceived as having beneficial ‘knowledge exchange’ effect for involved parties. It is recognised as a capacity-building factor of domestic research indicating the increase in research quality (Bornmann et al., 2015). However, existing research has reported reproduction of uneven global relations between countries in terms of science and technology. For example, patterns of international cooperation in nanotechnology are still centred on the developed countries, which are key nodes in international networks (Shapira and Wang, 2010). (Author)

  11. One Kind of Optimal International Security Investment Portfolio and Consumption Choice Problem%一类国际证券投资组合和消费选择的最优控制问题

    Institute of Scientific and Technical Information of China (English)

    吴臻; 魏刚

    2003-01-01

    One kind of optimal security investment portfolio and consumption choice problem in international securities markets when the securities pay dividends is studied by using classical dynamic programming method. The economical analysis to the optimal choice of the investor is given through the investment theory when the investor invests two kinds of securities in different countries. The explicit optimal solution is presented using very simple and direct method for two kinds of typical utility cases, the idea comes from the technique which is used for solving the celebrated LQ problem in optimal control theory. At last, some simulation results are given to illustrate the influence of the parameters on optimal choice.%首先运用经典动态规划方法,研究股票付息下国际证券市场中一类最优证券投资组合和消费选择问题,并利用投资学理论对投资者只投资两种证券情形的最优组合给出经济分析和解释.然后,运用非常简单和直接的方法对两种典型的效用函数给出最优解的显式形式,求解的技巧来自解决线性二次最优控制问题的配平方法.最后,给出一些数值计算例子来展示各模型参数对最优选择的影响.

  12. Students and Taxes: a Privacy-Preserving Study Using Secure Computation

    Directory of Open Access Journals (Sweden)

    Bogdanov Dan

    2016-07-01

    Full Text Available We describe the use of secure multi-party computation for performing a large-scale privacy-preserving statistical study on real government data. In 2015, statisticians from the Estonian Center of Applied Research (CentAR conducted a big data study to look for correlations between working during university studies and failing to graduate in time. The study was conducted by linking the database of individual tax payments from the Estonian Tax and Customs Board and the database of higher education events from the Ministry of Education and Research. Data collection, preparation and analysis were conducted using the Share-mind secure multi-party computation system that provided end-to-end cryptographic protection to the analysis. Using ten million tax records and half a million education records in the analysis, this is the largest cryptographically private statistical study ever conducted on real data.

  13. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  14. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  15. Analyzing International Students' Study Anxiety in Higher Education

    Science.gov (United States)

    Khoshlessan, Rezvan; Das, Kumer Pial

    2017-01-01

    The purpose of this study is to explore international students' study anxiety in a mid-sized public four-year university in Southeast Texas by comparing their existing study anxiety along lines of nationality, gender, age, major, degree, and stage of education. The subjects were selected using a convenience sample during the Spring of 2013. The…

  16. Conservation on international boundaries: the impact of security barriers on selected terrestrial mammals in four protected areas in Arizona, USA.

    Directory of Open Access Journals (Sweden)

    Jamie W McCallum

    Full Text Available Several thousand terrestrial protected areas (PAs lie on international boundaries. Because international boundaries can be focal points for trade, illegal activity and development, such PAs can be vulnerable to a range of anthropogenic threats. There is an increasing trend towards the erection of international boundary infrastructure (including fences, barriers and ditches in many parts of the world, which may reduce the risk of these anthropogenic threats to some PAs. However this may restrict home range and access to resources for some native species. We sought to understand the impacts of these two different types of threat by using camera traps to measure the activity level of humans, native and invasive mammals in four US PAs on the Mexican international boundary. Comparisons were made between treatment areas with barriers and those without. Results showed that puma and coati were more likely to appear in treatment areas without barriers, whereas humans were not observed more frequently in one treatment area over another. The suggestion is that the intermittent fencing present in this part of the world does affect some native species, but does not necessarily restrict the movement of humans (including illegal migrants, who may negatively impact native species.

  17. The European Union as a Security Actor: Moving Beyond the Second Pillar

    Directory of Open Access Journals (Sweden)

    Kamil Zwolski

    2009-04-01

    Full Text Available It is suggested in this article that there is a discrepancy between, on the one hand, literature that focuses on the European Union (EU as a security actor and, on the other, contemporary security studies literature. This difference concerns the fact that the literature on the EU as a security actor treats security in a narrower sense than how it is approached in the literature on security studies. Over the past few decades, security studies literature has begun to fully acknowledge that the concept of security has broadened beyond traditional ‘hard’ security concerns and can encompass many different issues, for example the security implications of climate change. However, the literature on the EU as a security actor very often associates security only with the second pillar of the EU’s organisational structure; in particular the intergovernmental cooperation embodied by the Common Foreign and Security Policy (CFSP and the European Security and Defence Policy (ESDP. The main purpose of this article is to utilise the broader security studies approach to security as a means to expand the understanding of security in the context of the EU’s performance on the international stage. This is important because it allows the Union’s �����actorness’ in the field of security to be examined in a more holistic manner.

  18. IEA Bioenergy Task 40Sustainable International Bioenergy Trade:Securing Supply and Demand Country Report 2014—United States

    Energy Technology Data Exchange (ETDEWEB)

    Hess, J. Richard [Idaho National Lab. (INL), Idaho Falls, ID (United States); Lamers, Patrick [Idaho National Lab. (INL), Idaho Falls, ID (United States); Roni, Mohammad S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Jacobson, Jacob J. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Heath, Brendi [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-01-01

    Logistical barrier are tied to feedstock harvesting, collection, storage and distribution. Current crop harvesting machinery is unable to selectively harvest preferred components of cellulosic biomass while maintaining acceptable levels of soil carbon and minimizing erosion. Actively managing biomass variability imposes additional functional requirements on biomass harvesting equipment. A physiological variation in biomass arises from differences in genetics, degree of crop maturity, geographical location, climatic events, and harvest methods. This variability presents significant cost and performance risks for bioenergy systems. Currently, processing standards and specifications for cellulosic feedstocks are not as well-developed as for mature commodities. Biomass that is stored with high moisture content or exposed to moisture during storage is susceptible to spoilage, rotting, spontaneous combustion, and odor problems. Appropriate storage methods and strategies are needed to better define storage requirements to preserve the volume and quality of harvested biomass over time and maintain its conversion yield. Raw herbaceous biomass is costly to collect, handle, and transport because of its low density and fibrous nature. Existing conventional, bale-based handling equipment and facilities cannot cost-effectively deliver and store high volumes of biomass, even with improved handling techniques. Current handling and transportation systems designed for moving woodchips can be inefficient for bioenergy processes due to the costs and challenges of transporting, storing, and drying high-moisture biomass. The infrastructure for feedstock logistics has not been defined for the potential variety of locations, climates, feedstocks, storage methods, processing alternatives, etc., which will occur at a national scale. When setting up biomass fuel supply chains, for large-scale biomass systems, logistics are a pivotal part in the system. Various studies have shown that long

  19. SISTEM PENDUKUNG KEPUTUSAN UNTUK MENGEVALUASI INTERNAL PROGRAM STUDI

    Directory of Open Access Journals (Sweden)

    Indhitya Rahman Padiku

    2016-04-01

    Full Text Available The development of major and study program cannot be separated by some internal factors weather directly influenced number of new registration students or indirectly. It needs a method to both know and to analyze internal evaluation variables in major or study program. Naive Bayes Clasifier (NBC method is the simple form of Bayesian network that assume all features are independent each other. NBC shows us a great performance entirely in accuracy and error level classification. NBC is able to differentiate irrelevance attribute and also classified some attributes in prediction needs. This research hopefully can be useful for major internal evaluating and study program in order to increase the number of new registration students. The classification by influenced of variables to evaluate the condition of both major and study program for the new registration students.

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.