WorldWideScience

Sample records for internet civil defense

  1. Internet Civil Defense: Feasibility Study

    National Research Council Canada - National Science Library

    LaPorte, Ron

    2002-01-01

    ... (and ultimately, international) system of information sharing, education and analysis via the Internet to connect the general public, community networked cells, emergency responders, local and national investigative authorities...

  2. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  3. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  4. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  5. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin

    2007-01-01

    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  6. "Homeland Defense: At Risk as a Result of Civil Support?"

    National Research Council Canada - National Science Library

    Brickhouse, Tonja

    2003-01-01

    This research effort is an attempt by the author to examine the broad area of military support to civil authorities and the potential for a significant demand on Department of Defense (DoD) resources...

  7. Defense Support of Civil Authorities - Are We Organized Right?

    National Research Council Canada - National Science Library

    Austin, Joseph

    2007-01-01

    The Department of Defense (DoD) has a long history of supporting civil authorities in the wake of catastrophic events with specialized skills and assets that can rapidly stabilize and improve the situation...

  8. Soviet civil defense plans make nuclear war winnable

    International Nuclear Information System (INIS)

    Goure, L.

    1985-01-01

    In this paper, the author expresses his opinion that the U.S. is naive and suicidal in its lack of civil defense preparation for nuclear war. The Soviets' extensive civil defense planning is evidence that they plan to use their nuclear weapons and survive a counterattack by the U.S. The author compares the two systems and explains why the Soviets' system is superior

  9. Human biomonitoring in civil defense; Humanbiomonitoring im Bevoelkerungsschutz

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Michael; Schmiechen, Katharina [Universitaetsmedizin Goettingen (Germany). Arbeits-, Sozial- und Umweltmedizin

    2012-07-01

    The booklet on human biomonitoring (HBM) in civil defense covers the following issues within two sections: (1) general part: definition and importance of human biomonitoring; application in civil defense; practice in a CBRN (chemical, biological, radiation, nuclear) scenario; sampling following a CBRN assignment; HBM for antidote administration; peculiarities of sampling in case of biological agents; microbiological detection procedure; human biomonitoring of radioactive metal isotopes. (2) Special part: substance profiles; list of HBM laboratories; list of poison information centers; questionnaire for exposure assessment in case of dangerous substance accidents; agreement for human biomonitoring examination.

  10. Marco Civil: Liberdade e o Futuro da Internet

    Directory of Open Access Journals (Sweden)

    Rafael Trindade Pellegrini

    2014-09-01

    Full Text Available Este trabalho tem como objetivo expôr de forma simples e objetiva uma correlação entre a obra escrita por Julian Assange e o projeto de Lei 12.965/14, conhecida como Marco Civil da Internet. Trazendo um alerta a sociedade sobre o que está acontecendo no meio de comunicação/informação, a Internet.

  11. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 4. Warning, Emergency Operations, and Support Programs.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    The need for, and a description of, emergency functions required to save lives and protect property in nuclear or natural disasters are presented. Topics discussed include: (1) The Civil Defense Warning System, (2) Introduction to the Emergency Operations Program, (3) Five subprograms of the Emergency Operations Program, (4) Emergency Operations…

  12. Analysis of consolidating defense acquisition information on the Internet.

    OpenAIRE

    Trulock, Troy E.

    1997-01-01

    Approved for public release; distribution is unlimited The Internet began over 30 years ago as a method of providing vital military communications following a nuclear attack. Today, due to the introduction of the World Wide Web and recent commercial interests, the Internet has grown into a multimedia source of information, and has become overloaded with information. Acquisition professionals in both the government and civilian defense acquisition sectors are attempting to use the Internet ...

  13. 24 CFR 100.308 - Good faith defense against civil money damages.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Good faith defense against civil money damages. 100.308 Section 100.308 Housing and Urban Development Regulations Relating to Housing and... Good faith defense against civil money damages. (a) A person shall not be held personally liable for...

  14. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  15. The Evolving Role of the Army National Guard in Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Rooney, Joseph

    2004-01-01

    .... To further unify the military effort U.S. Northern Command (NORTHCOM) has been created as a North American combatant command charged with the dual missions of homeland defense and civil support...

  16. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  17. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  18. 28 CFR 97.24 - No civil defense created.

    Science.gov (United States)

    2010-07-01

    ... intended to and does not establish a defense against an allegation of negligence or breach of contract..., statutory, and common law upon their activities (or other activities of a similarly hazardous nature). ...

  19. Defense Support of Civil Authorities. Handbook No. 1.04

    National Research Council Canada - National Science Library

    2005-01-01

    This supplemental handbook presents an appreciation of U.S. military forces and their roles as part of Department of Defense support to Federal emergency response in a terrorist Weapons of Mass Destruction or Effect (WMD/E) incident...

  20. Regional Civil Support Forces for Homeland Defense and Civil Support Missions

    National Research Council Canada - National Science Library

    Nuismer, Barbara A

    2007-01-01

    To protect the homeland, a plan to form ten regional Civil Support Forces (CSF) made up of National Guard forces has been proposed by senior fellow Christine Wormuth of the Center for Strategic and International Studies (CSIS...

  1. 76 FR 2246 - Defense Support of Civil Authorities (DSCA)

    Science.gov (United States)

    2011-01-13

    ... Presidential nominating conventions, such as the United Nations General Assembly, Super Bowls, and the Group of..., direction, and control of the USD(P) shall: (1) Serve as the principal civilian advisor to the Secretary of... principal advisor to the Secretary of Defense for all DoD health policy shall: (1) Provide guidance and...

  2. Civil Defense Commission of the Federal Minister of the Interior

    International Nuclear Information System (INIS)

    1986-01-01

    The proceedings volume presents the inaugural address to the 35th Meeting of the Civil Defence Commission, the welcome addresses, a survey of the 35 years of existence and work done by the Commission, and the reports on the activities of the Technical Committees I and III-VI. The twelve scientific papers read at the meeting are given in full-text. They deal with radiation injuries caused by nuclear weapon explosions or reactor accidents, and with thermal and mechanical lesions due to nuclear weapons, with the diagnosis and therapy of the injuries, and with preventive measures, particularly through application of radioprotective substances. (MG) [de

  3. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 2. Nuclear Weapons Effects and Shelter.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    Basic information about nuclear weapons is presented so that their effects can be meaningfully related to the defensive countermeasures which will be most effective against them. Major topics include: (1) Explosive power of nuclear weapons, (2) Major effects of nuclear explosions, (3) Two basic types of nuclear explosions, (4) Contrast between air…

  4. Actual Problems of Civil Law Deals Signing in Internet

    Directory of Open Access Journals (Sweden)

    Makhinya E. A.

    2013-10-01

    Full Text Available The article deals with the problems connected with making deals in Internet. Here is analyzed the legal regulation of electronic transactions. The special attention is paid to the most characteristic peculiarities of making elec- tronic transactions such as identification of participants, transactional character of making electronic deals.

  5. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  6. Governança na internet: um estudo sobre o Marco Civil brasileiro

    Directory of Open Access Journals (Sweden)

    Laura Vilela Rodrigues Rezende

    2016-01-01

    Full Text Available El trabajo tiene como propósito realizar un estudio sobre la legislación que rige el uso de Internet en Brasil, en el Marco Civil de Internet (Ley 12.965/2014. Se trata de una investigación descriptiva, de naturaleza cua litativa, basada en recopilación bibliográfica y estudio comparativo. Se ex pone inicialmente un breve histórico de Internet en Brasil y su panorama actual. Luego, se presenta el concepto de gobernanza en Internet y los su cesos que marcaron las discusiones acerca de esta temática. Se aborda el Marco Civil de Internet en Brasil, el histórico de su creación y los principios que lo rigen. Se concluye que es un importante instrumento oficial regla mentario para asegurar la libertad y los derechos del usuario. Su concep ción se fundamentó en la participación de la sociedad civil, lo que puede considerarse inédito en lo que se refiere a la creación de leyes reglamenta rias. Se considera que esta sea una ley sofisticada en cuanto a sus directri ces, lo que la vuelve una de las más progresistas del mundo. Pese a todo lo anterior, su trayectoria democrática de creación le otorga un carácter ge neralista y superficial.

  7. Neutralidade de Rede: o caso Comcast v. Netflix e o Marco Civil da Internet / Net Neutrality: Netflix vs. Comcast's Case and the Brazilian Internet Civil Mark

    Directory of Open Access Journals (Sweden)

    Maria Eduarda Cintra

    2015-10-01

    Full Text Available Purpose – The main goal of the article is to address how Brazil has progressed in favor of net neutrality. Comcast vs. Netflix case is used as an example to compare the actions took by the United States and Brazil concerning this theme. Methodology/approach/design – The text follows the problem-driven approach to infer some conclusions about the practices that has been adopted by the United States and Brazil. Findings – It has been verified that Brazil is on the vanguard of internet governance as far as net neutrality is concerned. Practical implications – The article can allow for a vast comprehension about net neutrality on par with the Brazilian Internet Civil Mark.

  8. Structure of the Russian internet-community according to the motives and types of civil activity

    Directory of Open Access Journals (Sweden)

    Trotsuk Irina V.

    2017-01-01

    Full Text Available Today in the sociological discipline, there is an impressive collection of empirical data and conceptual approaches to the study of civil society as a complex and ambiguous phenomenon, including a set of empirical indicators for assessing its development, strength, and sustainability. However, the authors believe that this impressive collection of theoretical models and empirical findings still does not explain a specific phenomenon, which is very important for the Russian society - various formats of civil activism that are not always permanent or widespread, and, thus, ignored by the researchers. The article provides a model for conceptualization and empirical study of civil activism that aims to fill this gap and was tested in the online survey. The questionnaire of the online survey provides the criteria for structuring the Internet community according to the involvement in civil activity, and allows identifying its key motives and barriers. The results of the online survey, in particular, present seven types of Internet users according to different formats of civil activism: super-activists, volunteers, online activists, members of public organizations, passive observers, only voting in the elections, and outsiders.

  9. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  10. Electronic Contracts and the Personal data Protection of the Consumer: Sources Dialogue Between the Consumer Protection Code and the Internet Civil Mark.

    Directory of Open Access Journals (Sweden)

    Rosane Leal Da Silva

    2016-10-01

    Full Text Available This paper analyzes the personal data protection of the consumer and your vulnerability in interactive electronic contracts, aiming to point means of defense. For this, uses the deductive approach and starts of the electronic contracting to discuss the legal protection of the consumer in light of the capturing and processing of personal data by the furnisher. Considering the absence of law about personal data, concludes that electronic contracting expands the consumer vulnerability, which requires the principles application of the Consumer Protection Code, adding the Internet Civil Mark in relation to the privacy protection.

  11. Defense nuclear energy systems selection methodology for civil nuclear power applications

    International Nuclear Information System (INIS)

    Scarborough, J.C.

    1986-01-01

    A methodology developed to select a preferred nuclear power system for a US Department of Defense (DOD) application has been used to evaluate preferred nuclear power systems for a remote island community in Southeast Asia. The plant would provide ∼10 MW of electric power, possibly low-temperature process heat for the local community, and would supplement existing island diesel electric capacity. The nuclear power system evaluation procedure was evolved from a disciplined methodology for ranking ten nuclear power designs under joint development by the US Department of Energy (DOE) and DOD. These included six designs proposed by industry for the Secure Military Power Plant Program (now termed Multimegawatt Terrestrial Reactor Program), the SP-100 Program, the North Warning System Program, and the Modular Advanced High-Temperature Gas-Cooled Reactor (HTGR) and Liquid-Metal Reactor (LMR) programs. The 15 evaluation criteria established for the civil application were generally similar to those developed and used for the defense energy systems evaluation, except that the weighting factor applied to each individual criterion differed. The criteria and their weighting (importance) functions for the civil application are described

  12. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  13. Neutralidade de Rede: O caso Comcast v. Netflix e o Marco Civil da Internet

    Directory of Open Access Journals (Sweden)

    Maria Eduarda Cintra

    2015-05-01

    Full Text Available Propósito – O artigo pretende fazer uma reflexão sobre como o Estado brasileiro avançou quanto à defesa do princípio da neutralidade de rede. Para essa análise, será utilizado o caso Comcast vs. Netflix como exemplo para comparar as ações do Estados Unidos e do Brasil sobre o tema. Metodologia/abordagem/design – O texto segue o método de abordagem de análise de problema para poder tirar conclusões sobre as práticas adotadas pelos Estados Unidos e pelo Brasil. Resultados – Foi constatado que o Brasil está na vanguarda sobre governança da internet, especialmente por zelar pela neutralidade de rede. Implicações práticas – O artigo serve para compreensão da discussão sobre neutralidade de rede e, especialmente, sobre o processo do Marco Civil da Internet no Brasil. Originalidade/relevância do texto – O artigo, ao fornecer uma perspectiva comparada entre o Estado americano e brasileiro, mostra como esse bem público, qual seja o da internet neutra e aberta, tem sido preservado.

  14. The relationship between personality, defense styles, internet addiction disorder, and psychopathology in college students.

    Science.gov (United States)

    Floros, Georgios; Siomos, Konstantinos; Stogiannidou, Ariadni; Giouzepas, Ioannis; Garyfallos, Georgios

    2014-10-01

    The purpose of this study is to assess any underlying links between personality, defense styles, Internet addiction disorder (IAD), and psychopathology in a college student sample. This is a cross-sectional study of fourth-year Greek Medical students who responded in a comprehensive test battery, which included validated questionnaires on IAD, personality traits, patterns of psychological defense styles, and psychopathology symptoms. A path model that was tested using Partial Least Squares (PLS) methodology showed that the defense styles employed by the students and certain personality traits (Impulsivity, Sensation Seeking, Neuroticism/Anxiety, and Aggression-Hostility) contributed to the prediction of variability in IAD, with IAD in turn predicting variability in overt psychopathology.

  15. Twenty Years of Evolutionary Change in the Department of Defense’s Civil Support Mission

    Science.gov (United States)

    2013-05-23

    Joint Task Force – National Capitol Region MACA Military Assistance to Civil Authorities MSCA Military Support to Civil Authorities NCR National...Assistance to Civil Authorities ( MACA ). MSCA was defined as civil support consisting of support for natural or manmade disasters, chemical, biological...consequence management, and other support as required.16 MACA was defined as

  16. Marco Civil da Internet: Limits From the Express and Unequivocal Requirement Consent as a Legal Protection of Personal Data on the Internet

    Directory of Open Access Journals (Sweden)

    Marco Antonio Lima

    2016-10-01

    Full Text Available This article examines the limits of the legal determination of express and unequivocal consent for the collection, use, storage, processing and protection of personal data as provided for in the Marco Civil da Internet (Law 12.965/2014 provided for in the list of rights and guarantees of users of the World Wide Web. With the increasing use of personal data from the Internet, for purposes of market analysis, prospecting investment trends, consumption and guidance of advertising campaigns - possible through technological resources for treatment and analysis of information - it is urgent to effectiveness the legal protection of this intangible property.

  17. Desastres, ordem social e planejamento em defesa civil: o contexto brasileiro Disasters, social order and civil defense planning: the Brazilian context

    Directory of Open Access Journals (Sweden)

    Norma Valencio

    2010-12-01

    discourse and the civil defense practices in the Brazilian context. First of all, it describes the main approaches of the sociology of disasters: the minimal consensus, the polarity and dichotomy, and shows one approach about the relationship between unequal development, vulnerability and civil defense planning. The present situation in Brazilian cities is of restriction to land access and it results in an increase in disasters. If changes do not occur in State's planning, with the adoption of new strategies explicitly formulated to break up the ideological point of view that subjects the poor groups, the disasters will continue happening. In the present structural dimension of planning, the Brazilian civil defense system classifies the vulnerable groups without considering social complexity. Disasters do not completely destroy the existing social systems, but they are capable of maintaining continuous processes of social indifference. Thus, the paper concludes by emphasizing the development of a participatory agenda in civil defense planning and decision-making processes.

  18. Activities of the Civil Defense Commission of the Federal Ministry of the Interior. Annual report 1979. Vol. 1

    International Nuclear Information System (INIS)

    1979-01-01

    The various working groups of the Committees I-III of the Commission report on the protective efficiency of buildings (shelters, crack formation, fire hazards), on the basic decisions to be taken in cases emergency, i.e. on the selection of appropriate provisions to be made for the protection of the population against hazards resulting from radioactive pollution of waters and air (civil defense) or from radiation exposure due to radioactive airborne particles and radioactive iodine, on radiation effects and the reduction of radiation impacts by specific substances, as well as on biological dosimetry in disaster relief. (DG) [de

  19. To Fight Against the Defensive Jurisprudence with the New Civil Procedure Code: Yes, We Can! Or Can We?

    Directory of Open Access Journals (Sweden)

    Rafael Ambrósio Gava

    2016-10-01

    Full Text Available In order to reduce their workloads, Brazilian Courts have been landing many precedents that lead to unwarranted restrictions to the right to appeal, thereby belittling the fundamental constitutional right to access to justice. Despite the existence of studies on this "defensive jurisprudence", there are still few who analyze it in the light of the new Civil Procedure Code (Law 13.105/2015, which is about to enter into force. This article aims to evaluate the suitability of the new CPC to remedy this adjudicative problem or at least minimize it. We demonstrated, based on literature and through a deductive argumentative reasoning, that the new procedural law contains a number of specific and general legal clauses which may be used as instruments able to curb the adjudicate "defensiveness. Nonetheless, the achievement of this goal will depend largely on how this legal clauses are to be interpreted and applied.

  20. The effects of workforce-shaping tools on retirement: the case of the Department of Defense civil service.

    Science.gov (United States)

    Asch, Beth J; Haider, Steven J; Zissimopoulos, Julie M

    2009-11-01

    Apriority area for the public health workforce research agenda is the study of the public health labor market and how wages and benefits affect workforce outcomes, including recruiting, retention, and retirement. This study provides an example of such a study for the Department of Defense civil service workforce. We analyze the financial incentives to retire that are specifically embedded in the retirement system and how different workforce-shaping policies would affect these incentives. The study then uses a recently estimated model of the effects of financial incentives on retirement behavior among defense civilians to predict how these workforce-shaping tools would affect retirement behavior. We find that buyouts, retention incentives, and other workforce-shaping tools have a sizable effect on predicted retirement behavior and therefore, could be useful policies to help manage retirement outflows.

  1. Emergency Support Function 15: Communication Synchronization during Defense Support of Civil Authorities Operations

    Science.gov (United States)

    2015-06-12

    for the future. I would like to thank my parents Juan and Helen for their love, support, and guidance; your hard work and sacrifices have given me...required support to civil authortities during emergency relief operations.9 Once civil authorites are capable of resuming responsibility for the...Freeman posit the researcher has an understanding of the cognitive styles of the program stakeholders which will increase access and comprehension of

  2. A Review on Internet of Things for Defense and Public Safety

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-01-01

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. PMID:27782052

  3. A Review on Internet of Things for Defense and Public Safety

    Directory of Open Access Journals (Sweden)

    Paula Fraga-Lamas

    2016-10-01

    Full Text Available The Internet of Things (IoT is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  4. A Review on Internet of Things for Defense and Public Safety.

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-10-05

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  5. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    .... During a crisis, the President and Secretary of Defense could authorize use of Title 10 forces. However, this "just in time" approach does not allow for the units assigned the opportunity to be fully trained to respond...

  6. Commission for Civil Defense of the Federal Ministry of the Interior

    International Nuclear Information System (INIS)

    1985-01-01

    A survey is presented of the current organisation and status of civil defence in Denmark, Norway, Sweden, and Finland. Two lectures deal with social and psychological aspects. The activities and measures undertaken within the framework of civil defence have to take into account the physical effects of various nuclear weapons, and appropriate radiation protection, and protection from biological effects of neutron weapons. Limiting values for all nuclides have to be defined in order to be able to assess the hazards of contaminated food or drinking water after a nuclear disaster. For five of the lectures separate subject analyses have been prepared for the database. (DG) [de

  7. Trying to Learn Lessons for Response to Extreme Events: Paradigm Shifts Affecting Civil Defense in the Trinational Region of Southwestern Amazonia

    Science.gov (United States)

    Santos, G. L. P.

    2015-12-01

    The last ten years have seen several extreme climate events in southwestern Amazonia with historic impacts. The City of Rio Branco, Capital of Acre, Brazil´s westernmost State, suffered its seventh consecutive annual flooding and its worst in March 2015. The city of Tarauacá, also in Acre, registered 12 flooding events between November 2014 and April 2015. The most recent flood of the trinational Acre River in 2015 set historic records for flood stage and number of displaced persons in Cobija, the Capital of Pando, Bolivia. From February to April 2014, floods of the Madeira River disrupted the one highway between Acre and southern Brazil. Puerto Maldonado, the capital in Madre de Dios Region of Peru had its worst flood in 50 years during 2014. In 2005 and 2010, prolonged droughts combined with ignition sources resulted in tens to hundreds of thousands of hectares of fire-damaged rainforests in the Madre de Dios, Acre and Pando (MAP) Region. The Civil Defenses in these three contiguous political units faced several abrupt paradigm shifts that affected their responses: 1) The drought of 2005 showed dramatically that regional rainforests do burn; 2) The recent flooding history, particularly in 2012 and 2015, demolished the cultural icon of a nine-year recurrence interval; 3) What happens outside your territory can be devastating. The Madeira River flood impeded an estimated 200 million dollars from circulating in Acre; 4) The past can be a terrible guide. For Cobija and Rio Branco, the 2015 flood was on the order of a meter higher than any other. Many home dwellers did not evacuate in time because they used past floods as a guide; 5) A collapse in communication - cell phones, land lines, and Internet - can get worse. In 2012, such a collapse occurred in two border towns for 5 days, yet in 2015 it lasted more than 11 days. Research is needed to address how institutions linked to Civil Defense can shift paradigms in time to be more effective.

  8. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling

    International Nuclear Information System (INIS)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid

    2010-01-01

    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  9. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  10. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  11. Civil defense is futile

    International Nuclear Information System (INIS)

    Schell, J.

    1985-01-01

    In this paper, the author argues that the effects of a nuclear war would be so total and so horrible that plans to survive are a vain hope. The author says with overwhelming immediate local effects striking the vast majority of the population, and with one-week doses of radiation then rising into the tens of thousands of rems, evacuation and shelters are a vain hope. In these circumstances, evacuation before an attack would exercise in transporting people from one death to another. In a full-scale nuclear attack, there would be in all likelihood no surviving communities to help afflicted communities. in the second place, everyone who failed to seal himself off from the outside environment for as long as several months would soon die of radiation sickness. The natural environment would also be dying. If anyone survived the attack, the generations that would be trying to rebuild a human life would be sick and possibly deform generations. The human race as it is known would cease to be

  12. Disputa política, neutralidade de rede e direitos dos usuários: A cobertura sobre a votação do Marco Civil da Internet

    Directory of Open Access Journals (Sweden)

    Camila Mont'Alverne

    2017-01-01

    the Marco Civil da Internet (a bill regulating Internet services. The goal is to study not only the newspapers’ opinions about the bill, but also their positions on issues beyond the Marco Civil involving conflicts between the government and the deputies of the coalition government. Adopting Robert Entman’s approach, the study proposes a content analysis of the framing of the debates. In all, seven frames were identified in the coverage of the debates: disagreements between the government and its allies; defense of Net neutrality; opposition to the bill; shortcomings of the bill; mobilization in favor of the bill; questions about the quality of service provided by telecom companies; and criticism of the existence of Brazilian data centers. In order to examine the editorials’ content, the frames were analyzed qualitatively, along with the actors and institutions referred to in the editorials. Analysis shows on the one hand that the coverage prioritized the conflicts between the president and the coalition, and on the other, that the arguments focused on the gaps in the bill and the defense of Net neutrality. The newspapers hold ambiguous positions on the Marco Civil—they both support the bill, and highlight the problems and interests which undermine the bill. With these editorials on the Marco Civil, the newspapers offer an interpretation to their readership, all the while trying to maintain the appearance of protectors of public interest and still defending their own interests as businesses producing online content. Ce travail essaie de comprendre comment les journaux O Estado de S. Paulo et Folha de S. Paulo ont dépeint, dans leurs éditoriaux, la controverse autour du vote sur le Marco Civil da Internet (une loi réglementant les services Internet à la Chambre des députés brésiliens. L’idée est de comprendre non seulement l’opinion des périodiques au sujet du projet de loi, mais aussi leurs positionnements dans un débat qui dépassait le cadre

  13. 32 CFR 310.46 - Civil actions.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil actions. 310.46 Section 310.46 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.46 Civil actions. An individual may file a civil suit...

  14. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  15. Defense Civil Support: DOD Needs to Identify National Guards Cyber Capabilities and Address Challenges in Its Exercises

    Science.gov (United States)

    2016-09-01

    participated in exercises to support civil authorities in a cyber incident or to test the responses to simulated attacks on cyber infrastructure owned by...authorities or to test the response to simulated attacks on cyber infrastructure owned by civil authorities. Of these 9 exercises, DOD conducted 7...and a response to simulated cyber attacks on electric grid networks. According to a North American Electric Reliability Corporation official, DOD

  16. An Internet-Based Course And The Application Of Employment-Based Methods In Civil Engineering Projects

    NARCIS (Netherlands)

    de Boer, S.J.; van de Vis, Dimitri; van de Vis, Dimitri; Mosch, Lars P.J.; Taylor Perkins, F.

    2001-01-01

    The paper addresses the question of how educational activities in civil engineering in the Netherlands can contribute to the application of employment-based programs in developing countries. National policy makers and international donor representatives acknowledge the various advantages of

  17. 32 CFR 855.13 - Civil fly-ins.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a) Civil...

  18. STUDENT VOLUNTEER ORGANIZATIONS IN THE MINISTRY OF THE RUSSIAN FEDERATION FOR CIVIL DEFENSE, EMERGENCIES AND ELIMINATION OF CONSEQUENCES OF NATURAL DISASTERS SYSTEM

    Directory of Open Access Journals (Sweden)

    Михаил Александрович Правдов

    2013-04-01

    Full Text Available The aim: the studing of the motivation of youth to volunteer activity. During the investigation were used methods of discussion, interviewing, interrogation and mathematical processing of data. In the article the experience of forming of youth voluntary social associations in Ivanovo region are regarded and the forming of a volunteers student group–“Sova” on the base of Ivanovo institute of the public fire service of the Ministry of the Russian Federation for Civil Defense, Emergencies and Elimination of Consequences of Natural Disasters. Was the level of Knowledge of Students about volunteer activity revealed, as well as the role student youth’s participation in volunteer organizations and the influence of the student volunteer associations on the development of pupils’ personalities in boarding school.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-41

  19. STUDENT VOLUNTEER ORGANIZATIONS IN THE MINISTRY OF THE RUSSIAN FEDERATION FOR CIVIL DEFENSE, EMERGENCIES AND ELIMINATION OF CONSEQUENCES OF NATURAL DISASTERS SYSTEM

    Directory of Open Access Journals (Sweden)

    Pravdov Mikhail Aleksandrovich

    2013-01-01

    Full Text Available The aim: the studing of the motivation of youth to volunteer activity. During the investigation were used methods of discussion, interviewing, interrogation and mathematical processing of data. In the article the experience of forming of youth voluntary social associations in Ivanovo region are regarded and the forming of a volunteers student group–“Sova” on the base of Ivanovo institute of the public fire service of the Ministry of the Russian Federation for Civil Defense, Emergencies and Elimination of Consequences of Natural Disasters. Was the level of Knowledge of Students about volunteer activity revealed, as well as the role student youth’s participation in volunteer organizations and the influence of the student volunteer associations on the development of pupils’ personalities in boarding school.

  20. Law No.13.192 workers that execute radiological services it state included in the advantage of the laws 9.940 and 9744 to civil or militaries employers belonging to Ministry of National Defense

    International Nuclear Information System (INIS)

    1962-01-01

    The civil and military officials that lend services in dependences of the Ministry of National Defense in the tasks of radiological services were applied in the compute to be carried out the legal norms referred to effects of their retirement [es

  1. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. 2. ed.; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Derakshani, Nahid; Drobig, Matthias; Koenig, Mario; Mentfewitz, Joachim; Prast, Hartmut; Uelpenich, Gerhard; Vidmayer, Marc; Wilbert, Stefan; Wolf, Manfred

    2016-07-01

    The recommendations for sampling for prevention of hazards in civil defense (analytics of chemical, biological and radioactive contaminations) cover the following topics: Requirements for sampling, description of the materials (chemical, biological and radioactive contaminated materials), decontamination, sample transport and protocol documents.

  2. Internet como herramienta de recuperación de la memoria de la Guerra Civil española

    Directory of Open Access Journals (Sweden)

    Laura Solanilla-Demestre

    2012-07-01

    Full Text Available The case of the movements of recovery of memory of the losers of the Spanish Civil War is atypical if compared with the dynamics generated in other situations. The delay between the moment of historical trauma and the establishment of a democratic state partly explains this singularity. In this article we analyze the agents involved and as the technological tools used to achieve the objectives.

  3. 32 CFR 310.47 - Civil remedies.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil remedies. 310.47 Section 310.47 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Privacy Act Violations § 310.47 Civil remedies. In addition to specific remedial...

  4. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  5. A la izquierda de internet : las redes ciudadanas y las nuevas formas de organización civil

    OpenAIRE

    Llistar, David

    2001-01-01

    Dentro de las posibilidades de las nuevas tecnologías de la comunicación, Internet adquiere un papel protagonista por las posibilidades que ofrece. A partir de algunas experiencias, como las que se presentan en este artículo, hoy es posible considerar este medio de comunicación global e interactivo como uno de los recursos de comunicación con mayor potencial para la formación y fortalecimiento de la cultura democrática, la educación para el desarrollo y la movilización ciudadana.

  6. Eliminating mental disability as a legal criterion in deprivation of liberty cases: The impact of the Convention on the Rights of Persons With Disabilities on the insanity defense, civil commitment, and competency law.

    Science.gov (United States)

    Slobogin, Christopher

    2015-01-01

    A number of laws that are associated with deprivations of liberty, including the insanity defense, civil commitment, guardianship of the person and numerous competency doctrines in the criminal context, require proof of mental disability as a predicate. The Convention on the Rights of Persons With Disabilities commands signatory states to eliminate that predicate. Summarizing principles set out in my book Minding Justice: Laws That Deprive People With Mental Disability of Life and Liberty, I explain how this seemingly radical stance can be implemented. Specifically, this article proposes adoption of an "integrationist defense" in the criminal context, an "undeterrability requirement" when the state seeks preventive detention outside of the criminal process, and a "basic rationality and self-regard test" for incompetency determinations. None of these proposals requires proof of a mental disorder as a predicate condition. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Romania's Experiences with Defense Reform Since the December 1989 Revolution and the Dimensions of Civil-Military Relations Viewed as a Trinity

    National Research Council Canada - National Science Library

    Stan, Ramona

    2007-01-01

    ...) since the collapse of communism in December 1989. The purpose of the thesis is to identify relevant qualitative and quantitative indicators for measuring the progress of Romanian political and military authorities in implementing defense reform initiatives...

  8. 32 CFR 269.3 - Civil monetary penalty inflation adjustment.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Civil monetary penalty inflation adjustment. 269... DEFENSE (CONTINUED) MISCELLANEOUS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 269.3 Civil monetary penalty inflation adjustment. The Department shall, not later than 180 days after the enactment of the...

  9. Defense Civil Support: DOD Has Made Progress Incorporating the Homeland Response Force into the Chemical, Biological, Radiological, and Nuclear Response Enterprise

    Science.gov (United States)

    2016-06-01

    role supporting civil authorities in a CBRN incident. By 2012, DOD had established the HRF, comprising 10 geographically dispersed National Guard...HRF/CERFP) (Sept. 30, 2010). 44A concept of operation is a verbal or graphic statement that clearly and concisely expresses what a Commander

  10. 32 CFR 935.21 - Civil rights, powers, and duties.

    Science.gov (United States)

    2010-07-01

    ... INSULAR REGULATIONS WAKE ISLAND CODE Civil Law § 935.21 Civil rights, powers, and duties. In any case in... the laws of the United States or this part, the civil rights, powers, and duties as they obtain under... 32 National Defense 6 2010-07-01 2010-07-01 false Civil rights, powers, and duties. 935.21 Section...

  11. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen. Kurzanleitung fuer die CBRN-Probenahme

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid (and others)

    2010-07-01

    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  12. Iranian English for Academic Purposes (EAP) Stakeholders' Attitudes toward Using the Internet in EAP Courses for Civil Engineering Students: Promises and Challenges

    Science.gov (United States)

    Atai, Mahmood Reza; Dashtestani, Reza

    2013-01-01

    English for academic purposes (EAP) has established itself as a considerable part of English as a foreign language (EFL) instruction in Iranian universities. Considering the Internet as a major educational source in EAP reading courses, it is highly important that the stakeholders have positive attitudes toward it and be aware of promises and…

  13. The Federal Civil Service Workforce: Assessing the Effects on Retention of Pay Freezes, Unpaid Furloughs, and Other Federal-Employee Compensation Changes in the Department of Defense

    Science.gov (United States)

    2014-01-01

    of the 2011–2013 pay freeze, the unpaid furloughs in 2013, a wave of retirements of the baby - boom generation, and recent proposals by lawmakers to...CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Department of Defense (DoD). These pay actions on top of a wave of baby -boomer retirements and various proposals by lawmakers to reduce federal compensation

  14. 32 CFR 806b.19 - Information compiled in anticipation of civil action.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information compiled in anticipation of civil action. 806b.19 Section 806b.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... compiled in anticipation of civil action. Withhold records compiled in connection with a civil action or...

  15. 32 CFR 269.4 - Cost of living adjustments of civil monetary penalties.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Cost of living adjustments of civil monetary... DEFENSE (CONTINUED) MISCELLANEOUS CIVIL MONETARY PENALTY INFLATION ADJUSTMENT § 269.4 Cost of living... increasing the maximum civil monetary penalty for each civil monetary penalty by the cost-of-living...

  16. Civil law

    NARCIS (Netherlands)

    Hesselink, M.W.; Gibbons, M.T.

    2014-01-01

    The concept of civil law has two distinct meanings. that is, disputes between private parties (individuals, corporations), as opposed to other branches of the law, such as administrative law or criminal law, which relate to disputes between individuals and the state. Second, the term civil law is

  17. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  18. Civil Society

    Science.gov (United States)

    Social Media Facebook @oasofficial Facebook Twitter @oas_official Twitter Newsletters Documents OAS Technology Social Development Summits of the Americas Sustainable Development T Telecommunications Terrorism Tourism Trade Treaties and Agreements W Women Y Youth Strategic Partners Permanent Observers Civil Society

  19. Civil War

    OpenAIRE

    Christopher Blattman; Edward Miguel

    2010-01-01

    Most nations have experienced an internal armed conflict since 1960. The past decade has witnessed an explosion of research into the causes and consequences of civil wars, belatedly bringing the topic into the economics mainstream. This article critically reviews this interdisciplinary literature and charts productive paths forward. Formal theory has focused on a central puzzle: why do civil wars occur at all when, given the high costs of war, groups have every incentive to reach an agreement...

  20. 32 CFR 215.9 - Providing military resources to civil authorities.

    Science.gov (United States)

    2010-07-01

    ... requests for firefighting assistance to DSA. (4) Request from civil law enforcement agencies for training... 32 National Defense 2 2010-07-01 2010-07-01 false Providing military resources to civil... DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES...

  1. Sofrimento psíquico no trabalho e estratégias defensivas dos operários terceirizados da construção civil Psychic suffering at work and defensive strategies of outsourced worker at building constructions

    Directory of Open Access Journals (Sweden)

    Paloma Castro da Rocha Barros

    2003-06-01

    Full Text Available Este artigo investiga as estratégias defensivas contra o sofrimento utilizadas pelos trabalhadores terceirizados de uma construtora em Brasília, utilizando como referencial teórico-metodológico a Psicodinâmica do Trabalho. Realizam-se entrevistas coletivas semi-estruturadas com 20 trabalhadores, distribuídos em quatro grupos com cinco participantes cada um, submetidas à análise de conteúdo. Os resultados apontam que os trabalhadores encontram-se vulneráveis e inseguros diante do modelo de produção terceirizado, que negligencia seus direitos e exige alta produtividade. O sofrimento torna-se visível por meio de indicadores de mal-estar tais como desgaste físico e mental e falta de reconhecimento, que é enfrentado mediante estratégias de mediação defensivas de negação e controle. O pressuposto inicial de que o modelo de produção baseado nos princípios tayloristas e na acumulação flexível de capital, preponderante no setor da construção civil, potencializa o sofrimento no contexto de produção é, então, confirmado.This paper investigated defensive strategies to confront suffering used by outsourced workers of building constructions builders in Brasília, having as theoretic-methodological reference the Psychodynamics of Work. Semi structured collective interview were undertaken with 20 workers, distributed in four groups with five participants each one. The interview was submitted to content analysis. The results show the workers presenting vulnerability and insecurity to face outsourced production models that would disregard their rights and demand high productivity. The suffering becomes visible by mal-being symptoms indicated as physic and mental stress and lack of recognition, that is copping by negation and control as defensive mediation strategies. The results confirm the initial presuppositions that the production model based on Taylorist principles and flexible accumulation of capital, predominant at the

  2. Internet Ethics Issues and Actions in Japan

    OpenAIRE

    江澤, 義典

    2013-01-01

    The International Symposium on Internet Ethics 2012 was planned and organized by the Korea Internet Security Agency and was held in September 2012 at the Lotte Hotel World in Seoul. This note relates to the presentation in Japan, it outlines current Internet ethics issues and actions in Japan. Moreover, four aspects of Japanese civilization were introduced as the bases of these ethics issues.

  3. 32 CFR 537.17 - Scope for civil works claims of maritime nature.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Scope for civil works claims of maritime nature. 537.17 Section 537.17 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND ACCOUNTS CLAIMS ON BEHALF OF THE UNITED STATES § 537.17 Scope for civil works claims of maritime...

  4. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  5. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  6. Civil Disobedience.

    Science.gov (United States)

    Martz, Carlton

    2000-01-01

    This theme issue looks at three historical and recent instances of civil disobedience. The first article examines the Free Speech Movement, which arose on the Berkeley campus of the University of California in the 1960s. The second article recounts the struggle of Mahatma Gandhi to free India from the British Empire. The final article explores the…

  7. Nuclear Winter: The implications for civil defense

    International Nuclear Information System (INIS)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1987-01-01

    ''Nuclear Winter'' is the term given to hypothesized cooling in the northern hemisphere following a nuclear war due to injection of smoke from burning cities into the atmosphere. The voluminous literature on this subject produced since the original paper in 1983 by Turco, Toon, Ackerman, Pollack, and Sagen (TTAPS) has been reviewed. The widespread use of 3-dimensional global circulation models have resulted in reduced estimates of cooling; 15 to 25 0 C for a summer war and a few degrees for a winter war. More serious may be the possibility of suppression of convective precipitation by the altered temperature profiles in the atmosphere. However, very large uncertainties remain in input parameters, the models, and the results of calculations. We believe the state of knowledge about nuclear winter is sufficiently developed to conclude: Neither cold nor drought are likely to be direct threats to human survival for populations with the wherewithal to survive normal January temperatures; The principal threat from nuclear winter is to food production, and could present problems to third parties without food reserves; and Loss of a crop year is neither a new nor unexpected threat from nuclear war to the US and the Soviet Union. Both have at least a year's food reserve at all times. Both face formidable organizational problems in distributing their reserves in a war-damaged environment. The consequences of nuclear winter could be expected to fall more heavily on the Soviet Union than the US due to its higher latitude and less productive agriculture. This may be especially true if disturbances of rainfall amounts and distribution persist for more than a year. 6 refs

  8. United States Civil Military Relations: Defense Reform

    Science.gov (United States)

    2016-03-01

    1064–6. (1986). 211 Barry M. Goldwater and Jack Casserly, Goldwater (New York, NY: St. Martin’s Press, 1988), 453. 212 Katherine Boo , “How...Unfinished Business.” The American Interest 7, no. 4 (April 2012). http://www.the-american-interest.com/2012/02/02/unfinished-business/. Boo , Katherine

  9. Nuclear Winter: Implications for civil defense

    Energy Technology Data Exchange (ETDEWEB)

    Chester, C.V.; Perry, A.M.; Hobbs, B.F.

    1988-05-01

    ''Nuclear Winter'' is the term given to the cooling hypothesized to occur in the Northern Hemisphere following a nuclear war as the result of the injection of smoke from burning cities into the atmosphere. The voluminous literature on this subject produced since the paper was published in 1983 by Turco, Toon, Ackerman, Pollack, and Sagen (TTAPS) has been reviewed. Three-dimensional global circulation models have resulted in reduced estimates of cooling---15 to 25/degree/C for a summer war and a few degrees for a winter war. More serious may be the possibility of suppression of convective precipitation by the altered temperature profiles in the atmosphere. However, very large uncertainties remain in input parameters, the models, and the results of calculations. We believe the state of knowledge about nuclear winter is sufficiently developed to conclude: Neither cold nor drought is likely to be a direct threat to human survival for populations with the wherewithal to survive normal January temperatures. The principal threat from nuclear winter is to food production, and this could present problems to third parties who are without food reserves. Loss of a crop year is neither a new nor an unexpected threat from nuclear war to the United States and the Soviet Union. Both have at least a year's food reserve at all times. Both face formidable organizational problems in distributing their reserves in a war-damaged environment. The consequences of nuclear winter could be expected to fall more heavily on the Soviet Union than the United States due to its higher latitude and less productive agriculture. This may be especially true if disturbances of rainfall amounts and distribution persist for more than a year.

  10. E-Commerce Adoption among Civil Servants of Selected States in ...

    African Journals Online (AJOL)

    Scholars have compared the way the Internet has changed the rules of ... doing things themselves with the ease, speed and convenience that internet ... Keywords: Civil Servants, Challenges, E-commerce, Socio-demographics, Nigeria ...

  11. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  13. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  14. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  15. 32 CFR 245.17 - U.S. civil and military air traffic control facilities.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false U.S. civil and military air traffic control facilities. 245.17 Section 245.17 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Procedures for Implementation of ESCAT §...

  16. Analysis of Air Force Civil Engineering Strategic Planning

    National Research Council Canada - National Science Library

    Mondo, Francis

    2003-01-01

    Several organizations within the Department of Defense, including the Air Force Civil Engineer, are actively engaged in strategic planning in an effort to create a roadmap for future capabilities and performance...

  17. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  18. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  19. Coding and encoding rights in internet infrastructure

    Directory of Open Access Journals (Sweden)

    Stefania Milan

    2017-01-01

    Full Text Available This article explores bottom-up grassroots ordering in internet governance, investigating the efforts by a group of civil society actors to inscribe human rights in internet infrastructure, lobbying the Internet Corporation for Assigned Names and Numbers. Adopting a Science and Technology Studies (STS perspective, we approach this struggle as a site of contestation, and expose the sociotechnical imaginaries animating policy advocacy. Combining quantitative mailing-list analysis, participant observation and qualitative discourse analysis, the article observes civil society in action as it contributes to shape policy in the realm of institutional and infrastructure design.

  20. The Civil-Military Gap in the United States. Does It Exist, Why, and Does It Matter?

    National Research Council Canada - National Science Library

    Szayna, Thomas S; McCarthy, Kevin F; Sollinger, Jerry m; Demaine, Linda J; Marquis, Jefferson P; Steele, Brett

    2007-01-01

    .... Specifically, there is a potential for a civil-military gap to undermine military effectiveness by reducing support for defense budgets, increasing the difficulties of recruiting quality people...

  1. 32 CFR 516.12 - Service of civil process outside the United States.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Service of civil process outside the United... AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Service of Process § 516.12 Service of civil process outside the United States. (a) Process of foreign courts. In foreign countries service of process...

  2. 32 CFR 516.10 - Service of civil process within the United States.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Service of civil process within the United States... CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Service of Process § 516.10 Service of civil process within the United States. (a) Policy. DA officials will not prevent or evade the service or process in...

  3. [Disaster Control and Civil Protection in Germany].

    Science.gov (United States)

    Kippnich, Maximilian; Kowalzik, Barbara; Cermak, Rudolf; Kippnich, Uwe; Kranke, Peter; Wurmb, Thomas

    2017-09-01

    The train crash of Bad Aibling/Germany in February 2016 and the terrorist attacks of the recent years in Europe have demonstrated the urgent need to be prepared for such disastrous events. Disaster preparedness and disaster control are very important governmental duties, as are civil protection and civil defense. In Germany the responsibility for those tasks are divided between the 16 "Länder" and the Federation. While the Federation takes care of the civil protection and disaster assistance, the Länder are responsible for disaster control. The presented article focuses on these issues and gives valuable insights into the German system of disaster control and civil protection with a focus on health protection. Georg Thieme Verlag KG Stuttgart · New York.

  4. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  5. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  6. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  7. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  8. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  9. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  10. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  11. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  12. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  13. Internet and Electronic Information Management

    Science.gov (United States)

    2003-04-01

    technologies ) and information markets (buying and selling information ), and the competitors’ success or failures. Such factors are beyond the control of... technology , and 1-19 market pressures. They have to cooperate with other entities within their organizations to develop more innovative information ...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP014048 TITLE: Internet and Electronic Information Management

  14. Stasis and Bellum Civile

    DEFF Research Database (Denmark)

    Lange, Carsten Hjort

    2017-01-01

    David Armitage’s new monograph Civil Wars: A History in Ideas (2017) will undoubtedly long remain a standard reference work. It presents readers with a vision of civil war as part of the longue durée. The argument might be further strengthened, however, if a more inclusive Greco-Roman approach...... to ancient civil war is accepted. This essay focuses on stasis vs. bellum civile, the origins of the concept of civil war, the approach of later Roman writers (such as Appian and Cassius Dio) to the concepts of stasis and bellum civile, and, finally, the question of what makes a civil war a civil war....... Whatever concepts were used, the Romans were not the first to experience internal war as a civil war—that is, a war between the citizens of a polity....

  15. Internet censorship in Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    2015-06-01

    Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.

  16. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  17. Civil Law Glossary.

    Science.gov (United States)

    Update on Law-Related Education, 1997

    1997-01-01

    Presents a glossary of civil law terms originally compiled for journalists by the American Bar Association. Defines many essential civil law concepts and practices including compensatory damages, jurisdiction, motion to dismiss, discovery, and remedy. (MJP)

  18. 32 CFR 537.15 - Statutory authority for maritime claims and claims involving civil works of a maritime nature.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Statutory authority for maritime claims and claims involving civil works of a maritime nature. 537.15 Section 537.15 National Defense Department of....15 Statutory authority for maritime claims and claims involving civil works of a maritime nature. (a...

  19. Citizenship in civil society?

    NARCIS (Netherlands)

    Ossewaarde, Marinus R.R.

    2007-01-01

    This article seeks to provide a conceptual framework to complement and guide the empirical analysis of civil society. The core argument is that civil society must be understood, not as a category of (post)industrialized society, but as one of individualized society. Civil society is characterized by

  20. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  1. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  2. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  3. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current

  4. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  5. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  6. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  7. A Rights-Based Approach to Internet Policy and Governance for the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The debate on Internet freedom has intensified over the last few years as governments and civil society organizations explore policies to safeguard online civil liberties and online security. Civil society organizations and academics have noted the growth of online censorship and surveillance. Many have argued for a more ...

  8. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  9. 32 CFR Appendix A to Part 37 - What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment Agreements? A Appendix A to Part 37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY...

  10. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  11. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  12. Civil-Military Relations and Gen. Maxwell Taylor: Getting It Right and Getting It Wrong

    National Research Council Canada - National Science Library

    Tart, Randal

    1997-01-01

    ... are paid. In the first situation, Taylor got his civil-military relations right, even though he fought a losing battle with President Eisenhower over Ike's dangerous defense strategy of 'massive retaliation...

  13. Civil Society and Governance

    DEFF Research Database (Denmark)

    Hulgård, Lars

    An illustration of how important the relationship is between civil society anbd governance. A short historic journey with four snapshots of times and situations that have provided interesting evidence about the connection between civil society and governance. My goal for the short historic journey...... is to make clear and hopefully even verify that providing knowledge about the impact of civil society and citizens’ participation on governance is one of the most urgent research tasks in the current period of time....

  14. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  15. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  16. Legalisation of Civil Wars

    DEFF Research Database (Denmark)

    Buhl, Kenneth Øhlenschlæger

    2009-01-01

    This article is concerned with the legal challenges of regulating civil wars in international humanitarian law. Civil war is not a term used in international law; it falls however, withing the context of the legal term 'armed conflicts not of an international character', although the shorter 'non......-international armed conflict' is used here. Civil wars are usually limited to the territory of a state. Considering that international law is generally concerned with the legal relations between states – being a legal system based on the system of states with states as its subjects – the main question is how civil...... wars as internal conflicts have become subject to international humanitarian law....

  17. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  18. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  19. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  20. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  1. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  2. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  3. Duties of care on the Internet

    NARCIS (Netherlands)

    van Eijk, N.; van Engers, T.; Wiersma, C.; Jasserand, C.; Abel, W.

    2011-01-01

    Internet Service Providers currently find themselves in the spotlight, both in a national and international context, with regard to their relationship both with governments and other private parties, on for example questions of (civil) liability. The paper focuses on duties of care as concerns the

  4. Apps for Ancient Civilizations

    Science.gov (United States)

    Thompson, Stephanie

    2011-01-01

    This project incorporates technology and a historical emphasis on science drawn from ancient civilizations to promote a greater understanding of conceptual science. In the Apps for Ancient Civilizations project, students investigate an ancient culture to discover how people might have used science and math smartphone apps to make their lives…

  5. Refractions of Civil Society

    DEFF Research Database (Denmark)

    Kuzmanovic, Daniella

    The thesis investigates various perceptions of civil society among civic activists in Turkey, and how these perceptions are produced and shaped. The thesis is an anthropological contribution to studies of civil society in general, as well as to studies on political culture in Turkey....

  6. Civil engineering work

    International Nuclear Information System (INIS)

    Cousyn, Rene; Goubin, Jean.

    1977-01-01

    Although it does not require a specifically new technicality, the Civil Engineering site of a nuclear power plant is a complex work. Considering as an example the power plant currently in construction at Tricastin, the authors describe the main Civil Engineering work and task organization applied to carry it out [fr

  7. Unleashed Potential: The Potential of Civil Military Support Elements in Theater Security Cooperation

    Science.gov (United States)

    2012-05-16

    MEC Ministerio de Educacion y Cultura (Minister of Education and Culture) METT-TC Mission, Enemy, Time, Troops Available, & Civil Considerations...interests. Moreover, the QDR calls for an expansion of civil affairs capacity especially in the face of Counterinsurgency and Counterterrorism operations...07, Department of Defense Joint Publication 3-57, and annual US Special Operations Command (USSOCOM) Posture Statements ( especially 2008) before

  8. Civil War and Inoperativity

    DEFF Research Database (Denmark)

    Flohr, Mikkel

    2017-01-01

    This article analyses the penultimate publication in Giorgio Agambens Homo Sacer-series Stasis: Civil War as a Political Paradigm. It compares and contrasts the paradigm of civil war with the preceding paradigm of the exception, and identifies a significant displacement in the relationship between...... civil war and the sovereign state, in spite of Agamben’s insistence on their continuity. Agamben’s decoupling of civil war and the sovereign state facilitates novel political possibilities that unfortunately remain underdeveloped in the book. The article proceeds to develop Agamben’s brief intimations...... of inoperativity towards a concept of destituent power drawing on his other writings. It makes the argument for thinking civil war and inoperativity – stasis and stasis – together to derive a concept of destituent power as a form of revolution against the sovereign state, which does not constitute a new sovereign...

  9. Reconceptualizing Civil Regulation

    DEFF Research Database (Denmark)

    Galang, Roberto Martin; Castello, Itziar

    2011-01-01

    This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility litera....... Finally, we argue that, in Asia, governments act as a structuration mechanism which challenges the current understanding of CSR.......This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility...... and environmental standards; but also that local, small and medium companies play a key role in the development of Asian civil regulation. We call this second finding the “CSR importation trap”. Our findings are supported by evidence on the limitations in the interchangeable properties of business and governments...

  10. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper.

  11. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Science.gov (United States)

    Ma, Hing Keung; Chu, Miranda K. Y.; Chan, Winnie W. Y.

    2011-01-01

    In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper. PMID:22125462

  12. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  13. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  14. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  15. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. The Civil War in cyberspace today

    Directory of Open Access Journals (Sweden)

    Matilde EIROA

    2015-03-01

    Full Text Available The appeal of the Spanish Civil War in the online world is a phenomenon deserving of attention, as an event that took place more than 75 years ago which still arouses debate and the curiosity of many. It is surprising that the media world considers it “newsworthy” and that it has an important presence on the Internet — on blogs, websites, You Tube, and even social media platforms such as Facebook and Twitter. This article examines all mention of the Civil War in online media. We start from the idea that the features of the online world allow for an extensive and multifaceted production of media of content which is more cultural, more social, and more attuned to the passing of time.

  17. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  18. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  19. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  20. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  1. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    scientific activities conducted by the author, partly based on the author's experience as a member, through a number of years, of the Danish Standing Committee on Procedural Law (Retsplejeraadet), which on a continuous basis evaluates the need for civil procedural reforms in Denmark, and finally also based......The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...... procedural questions, including relations to the Brussels I Regulation and Denmark's participation in this Regulation via a parallel convention with the EU countries, impact on Danish civil procedure of the convention on human rights, preparation and pronouncement of judgment and verdict, questions of appeal...

  2. Civil Surgeon Info

    Data.gov (United States)

    Department of Homeland Security — USCIS designates certain doctors (also known as civil surgeons) to perform the medical exam required for most Green Card applicants. This data set represents the...

  3. Nuclear energy and civilization

    International Nuclear Information System (INIS)

    Soentono, S.

    1996-01-01

    The role of energy is indeed very important since without it there will be no living-things in this world. A country's ability to cultivate energy determines the levels of her civilization and wealth. Sufficient energy supply is needed for economic growth, industrialization, and modernization. In a modern civilization, the prosperity and security of a country depends more on the capability of her people rather than the wealth of her natural resources. Energy supplies the wealth, prosperity and security, and sufficient reliable continuous supply of energy secures the sustainable development. The energy supply to sustain the development has to improve the quality of life covering also the quality of environment to support the ever increasing demand of human race civilization. Energy has a closer relationship with civilization in a modern society and will have to become even closer in the future more civilized and more modern society. The utilization of nuclear energy has, however, some problems and challenges, e.g. misleading information and understanding which need serious efforts for public information, public relation, and public acceptance, and possible deviation of nuclear materials for non-peaceful uses which needs serious efforts for technological and administrative barriers, precaution, prevention, safety, physical protection, safeguard, and transparency. These require cooperation among nuclear community. The cooperation should be more pronounced by heterogeneous growing Asian countries to reach harmony for mutual benefits toward better civilization. (J.P.N.)

  4. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective

  5. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  7. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  8. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  9. Should bioengineering graduates seek employment in the defense industry?

    Science.gov (United States)

    Johnson, Arthur T

    2014-01-01

    They say that the difference between a mechanical engineer and a civil engineer is that the mechanical engineer develops weapons whereas a civil engineer designs targets. The implication is that some engineers are involved with building peaceful infrastructure whereas others contribute to destruction. This brings to mind the question: what is the proper role for engineers in the creation of weapons and defenses against them? In particular, should engineers specializing in biology or medicine be involved in the defense industry? After all, bioengineers are supposed to be builders or healers rather than warriors or destroyers.

  10. Civil society sphericules

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2014-01-01

    the organization strategizes about and seeks to articulate amongst Tanzanian youth. Situated in the ‘perverse confluence’ (Dagnino, 2011) between neoliberal and radical democratic agendas in the communicative practices of civil society-driven media platforms, Femina navigates between identities as an NGO, a social...... movement and a media initiative. In the context of the growing literature on social networking sites and their affordances, dynamics and structures, the case of Femina illustrates how a civil society sphericule emerges within the dynamic co-evolution of new and old media platforms. The study is furthermore...... an example of the difficult shift in civil society practice, from service provision to an agenda of public service monitoring, social accountability and community engagement....

  11. Producing Civil Society

    DEFF Research Database (Denmark)

    Feldt, Liv Egholm; Hein Jessen, Mathias

    Since the beginning of the 1990’s, civil society has attracted both scholarly and political interest as the ‘third sphere’ outside the state and the market not only a normatively privileged site of communication and ‘the public sphere’, but also as a resource for democratization processes...... and social cohesion, as well as a provider of welfare services from a welfare state in dire straits. However, such a view upholds a sharp distinction between the three sectors and their distinct logic. This article claims that the separation of spheres is a fundamental part of our ‘social imaginary......’ and as such dominates our way of thinking about civil society. Yet, this view hinders the understanding of how civil society is not a pre-existing or given sphere, but a sphere which is constantly produced both discursively, conceptually and practically. Through two examples; 1,the case of philanthropy in the beginning...

  12. Strengthening Military Relationships for Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Norris, Tracy R

    2008-01-01

    .... The question of State Adjutants General having operational control of Title 10 military forces and Title 10 active duty officers under USC 32 given operational control of Title 32 National Guard...

  13. The Civil Defense Acquisition Workforce: Enhancing Recruitment Through Hiring Flexibilities

    Science.gov (United States)

    2016-11-22

    20 Other Aspects of Acquisition Workforce Improvement ................................................................ 21 Pay Flexibilities...a subset of civilian acquisition hires (external hires) and may contain some counting discrepancies . These limitations might be partially...potential discrepancies with department-level guidance. DOD has taken steps to encourage better use of hiring flexibilities department-wide. The USD(AT&L

  14. Incorporating civil-defense shelter space in new underground construction

    International Nuclear Information System (INIS)

    Chester, C.V.

    1981-01-01

    At the present time, the population of the US is approximately ten times more vulnerable to nuclear weapons than the Soviet population. This vulnerability can be reduced rapidly by urban evacuation in a crisis. However, the need to keep the essential economy running in a crisis, as well as coping with attacks on short warning, makes the construction of shelter space where people live very desirable. This can be done most economically by slightly modifying underground construction intended for peacetime use. The designer must consider all elements of the emergency environment when designing the space. Provisions must be made for emergency egress, light and ventilation (without elecric power), blast closures, water, sanitation, and food. The option of upgrading the space in a crisis should be considered. An example is given

  15. Civil Military Relations and Defense Reform in Poland

    National Research Council Canada - National Science Library

    Tomaszycki, Marek

    2006-01-01

    .... From the beginning, these changes in the European order included security problems. This paper describes changes in the national security of Poland since 1989 with a focus on the Polish Armed Forces (PAF...

  16. Civil Defense Commission of the Federal Minister of the Interior

    International Nuclear Information System (INIS)

    1982-01-01

    The proceesings volume contains 19 papers, of which 5 have been abstracted and recorded separately. The papers discuss the consequences of various types of catastrophes, protective measures and problems of radiobiology arising in case of a nuclear disaster. (MG) [de

  17. The problems of civil defense at the radiation accidents

    International Nuclear Information System (INIS)

    Ojagov, H.O.

    2003-01-01

    Full text: A decrease of risk to a possible low level (optimization) is carried out due to the following two circumstances. A lime it of risk of a potential irradiation from all possible sources of radiation is regulated and for each source the boundary of risk is established; under a decrease of potential radiation risk there is the minimum level of risk, below which a risk is considered as negligible and further decrease of risk is inexpedient. The persons attracted for realization of emergency and saving work, are considered on the same footing as the personnel working with ethnogeny sources of ionizing radiation or those who work in conditions under the influence of latter. Main problems and measures of radioprotection are outlined in the appropriate normative documents of the Republic. At different stages of an accident the interference is regulated by zoning of the polluted territories which is based on the value of annual ED which can be received by the inhabitants in absence of measures of irradiation protection. On the territories where an annual ED does not exceed 1 mSv the usual control of radioactive pollution of objects of an environment and agricultural production is made and by its results an irradiation dose of the population on this territory is not restricted by the radiation factor. This territory is not considered as a zone of a radioactive pollution. Applying the security system in all cases the limits are applied to a sum of all appropriate doses from external radiation for an established period of time and half - century doses from receipts for the same time. Based on the stated above principles which are used as guidance at acceptance of the decisions about character of an interference (protective measures) at planning protective measures on a case of radiation accidence the derivative levels of interference: doses and power of radiation doses levels of radioactive pollution and other characteristics RP with reference to concrete radio dangerous objects and conditions of their accommodation in view of probable types of emergencies scripts of development of emergency situations and forming RC, can be established

  18. Influence of civil defense on strategic countervalue fatalities

    International Nuclear Information System (INIS)

    Harvey, T.F.

    1982-01-01

    Two modeling studies were conducted to simulate the effect of fallout shelters on the outcome of a massive countervalue nuclear exchange between the Soviet Union and the United States. One was to determine the number of nuclear weapons required to mount an effective fallout attack against a country with dispersed population; the other was to determine the number of expected US fatalities resulting from a countervalue attack against US urban population centers. The results of these studies indicate that the number of weapons required to mount such an attack depends on the adequacy of the shelter system and that the evacuation of urban populations can substantially reduce expected fatality levels

  19. Civil Resistance: An Essential Element of a Total Defense Strategy

    Science.gov (United States)

    2014-06-01

    were at risk because of Russian-speaking laborers’ mass immigration . 7. Doctrine The Singing Revolution had remarkable nonviolent discipline. Not a...Success Poland Communist Regime 1956 1956 Partial Success Argentina Attempted Coup 1986 1986 Success Chile Ibanez regime 1931 1931 Success South...Success Chile August Pinochet 1983 1989 Success Cedar Revolution Lebanon Syrian Forces 2005 2005 Success 108 Campaign Location Target Start End

  20. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  1. Defense AT&L. Volume 40, Number 4, July-August 2011

    Science.gov (United States)

    2011-08-01

    program monitored by DCMA, KRCC, SAO-A, and ANA representatives. ANA and the new Afghanistan National Civil Order Police (ANCOP) personnel field-tested...or can’t meet a commitment, be up front about it. When you point out and explain your own lapses or potential roadblocks, it engen - ders trust in...senior military personnel, civil - ians, defense contractors, and defense industry professionals in pro- gram management and the acquisition

  2. Brazilian Foreign Policy Towards Internet Governance

    Directory of Open Access Journals (Sweden)

    Maurício Santoro

    Full Text Available Abstract Snowden´s whistleblowing on the NSA program had a powerful impact in Brazil, prompting Dilma Rousseff´s administration to promote, at the United Nations, resolutions on Internet privacy, freedom of expression, as well as to host important multistakeholder conferences and, domestically, to approve the innovative legislation known as Marco Civil. These answers were only possible due to a network of officials and activists. However, Brazil´s global leadership in Internet governance is fragile, with many internal contradictions.

  3. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  4. Decline of Civilian power in Japan's Defense Policy

    OpenAIRE

    SEBATA, TAKAO; 瀬端, 孝夫

    2006-01-01

    Over the last thirty years, military official of Japan's Self-Defense Forces (SDF) have begun voicing their opinions more aggressively, exerting influence and power in such areas as: the right of personnel management, budget formulation, organization, and defense policy decision-making. Due to the enhanced status of military officials, change of power balance between civilians and military is taking place. This paper examines civil-military relations in the above areas and discusses how this ...

  5. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  6. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  7. CIVIL RIGHTS AND MINORITIES.

    Science.gov (United States)

    HARTMAN, PAUL

    A MAJOR INTENT OF THE CONSTITUTION AND ITS AMENDMENTS, TO GUARANTEE EQUAL RIGHTS TO ALL CITIZENS REGARDLESS OF RACE, CREED, OR COLOR, HAS BEEN REINFORCED BY THE CIVIL RIGHTS STATUTES OF MANY STATES. IN SOME STATES SUCH LAWS HAVE BEEN ON RECORD FOR THREE-QUARTERS OF A CENTURY. IN OTHER STATES THE SAME CONSTITUTIONAL INTENT HAS BEEN DENIED BY…

  8. Civil Law and Neuroscience

    NARCIS (Netherlands)

    de Kogel, C.H.; Schrama, W.M.; Smit, M.

    2014-01-01

    The relationship between the brain and human behaviour is receiving increasing attention in legal practice. Much has already been published about the role of neuroscience in criminal law, but surprisingly little is known about its role in civil law. In this contribution, the relevance of

  9. Nuclear damage - civil liability

    International Nuclear Information System (INIS)

    Simoes, A.C.

    1980-01-01

    An analysis is made of the civil liability for nuclear damage since there is a need to adjust the existing rules to the new situations created. The conventions that set up the new disciplining rules not considered in the common law for the liability of nuclear damage are also mentioned. (A.L.) [pt

  10. Creative Ventures: Ancient Civilizations.

    Science.gov (United States)

    Stark, Rebecca

    The open-ended activities in this book are designed to extend the imagination and creativity of students and encourage students to examine their feelings and values about historic eras. Civilizations addressed include ancient Egypt, Greece, Rome, Mayan, Stonehenge, and Mesopotamia. The activities focus upon the cognitive and affective pupil…

  11. GPS Civil Monitoring Performance Specification

    Science.gov (United States)

    2009-02-10

    This Civil Monitoring Performance Specification (CMPS) is published and maintained at : the direction of the Program Manager for Civil Applications, Global Positioning Systems : Wing (GPSW). The purpose of this document is to provide a comprehensive ...

  12. Re-thinking civil disobedience

    Directory of Open Access Journals (Sweden)

    Theresa Züger

    2013-11-01

    Full Text Available This article points out a struggle of today’s societies with the traditional concepts of civil disobedience and stresses the need for reevaluation of the concept of civil disobedience for policy making and public discourse. Starting with a minimal definition of civil disobedience, the article introduces Hannah Arendt’s approach for a legitimisation of civil disobedience and discusses her ideas for digital actions, which are increasingly framed as digital forms of civil disobedience. Addressing WikiLeaks as an example of digital civil disobedience, the author problematises the internal secrecy of WikiLeaks and the focus on Julian Assange as a single decision-maker. Both aspects challenge Arendt’s understanding of legitimate civil disobedience. Even though traditional criteria of civil disobedience need to be revisited in the digital age, organisations or disobedience actors might themselves in their actions be well-advised to comply with the principles they fight for.

  13. Civil partnerships five years on.

    Science.gov (United States)

    Ross, Helen; Gask, Karen; Berrington, Ann

    2011-01-01

    The Civil Partnership Act 2004, which came into force in December 2005 allowing same-sex couples in the UK to register their relationship for the first time, celebrated its fifth anniversary in December 2010. This article examines civil partnership in England and Wales, five years on from its introduction. The characteristics of those forming civil partnerships between 2005 and 2010 including age, sex and previous marital/civil partnership status are examined. These are then compared with the characteristics of those marrying over the same period. Further comparisons are also made between civil partnership dissolutions and divorce. The article presents estimates of the number of people currently in civil partnerships and children of civil partners. Finally the article examines attitudes towards same-sex and civil partner couples both in the UK and in other countries across Europe.

  14. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  15. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  16. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  17. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  18. 77 FR 55175 - Civil Penalties

    Science.gov (United States)

    2012-09-07

    ... [Docket No. NHTSA-2012-0131; Notice 1] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations of motor vehicle safety requirements... and consumer information provisions. Specifically, this proposes increases in maximum civil penalty...

  19. 75 FR 79978 - Civil Penalties

    Science.gov (United States)

    2010-12-21

    ... [Docket No. NHTSA-2010-0114; Notice 2] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for related series of violations of the National Traffic and Motor Vehicle Safety... Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as amended by the Debt Collection...

  20. 75 FR 5244 - Civil Penalties

    Science.gov (United States)

    2010-02-02

    ... [Docket No. NHTSA-2009-0066; Notice 2] RIN 2127-AK40 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements involving school buses, bumper... theft protection requirements. This action is taken pursuant to the Federal Civil Monetary Penalty...

  1. 77 FR 70710 - Civil Penalties

    Science.gov (United States)

    2012-11-27

    ... [Docket No. NHTSA-2012-0131; Notice 2] RIN 2127-AL16 Civil Penalties AGENCY: National Highway Traffic... civil penalty amounts for violations of motor vehicle safety requirements for the National Traffic and... provisions. Specifically, this increases the maximum civil penalty amounts for single violations of motor...

  2. 75 FR 49879 - Civil Penalties

    Science.gov (United States)

    2010-08-16

    ... [Docket No. NHTSA-2010-0114; Notice 1] RIN 2127-AK78 Civil Penalties AGENCY: National Highway Traffic... proposes to increase the maximum civil penalty amounts for violations covering a related series of... action would be taken pursuant to the Federal Civil Monetary Penalty Inflation Adjustment Act of 1990, as...

  3. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  4. 32 CFR 700.822 - Delivery of personnel to civil authorities and service of subpoena or other process.

    Science.gov (United States)

    2010-07-01

    ... service of subpoena or other process. 700.822 Section 700.822 National Defense Department of Defense... personnel to civil authorities and service of subpoena or other process. (a) Commanding officers or other... service of subpoenas or other process as provided by the Manual of the Judge Advocate General. ...

  5. Nuclear war and other catastrophes. Civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945

    International Nuclear Information System (INIS)

    Diebel, Martin

    2017-01-01

    The book civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945 discusses the following issues: aerial defense and the atomic bomb (1945 - 1968), crises and catastrophes in the shadow of the bomb (1962 - 1978), civil defense and the comeback of the (nuclear) war (1976 - 1979), civil defense and the second ''Cold War'' (1979 - 1986), Chernobyl and the end of the Cold War (1979 - 1990), war, catastrophe and safety in the 20th century - a conclusion.

  6. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  7. 41 CFR 101-30.504 - Cataloging data from Defense Logistics Services Center (DLSC).

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Cataloging data from Defense Logistics Services Center (DLSC). 101-30.504 Section 101-30.504 Public Contracts and Property... data from Defense Logistics Services Center (DLSC). Upon receipt of cataloging data from civil agencies...

  8. Departamento de Obras Civiles

    Directory of Open Access Journals (Sweden)

    Director Departamento de Obras Civiles

    1984-12-01

    Full Text Available Es la unidad académica que se crea como estructura básica para la formación profesional del Constructor Civil. El departamento está orientado a las siguientes áreas: Obras Viales, Fluviales y Marítimas; Hormigones y Mecánica de Suelos; Laboratorios y Control de Calidad; Planificación y Programación; Administración; Organización y Gestión Financiera, conocimientos insertos en un total de 33 asignaturas, prácticas y seminarios siendo equivalentes a más de 100 créditos, lo cual representa un 42% del total de las asignaturas correspondientes al Plan de Estudios de la Carrera de Construcción Civil.

  9. Insolvencias. Civil y societaria

    Directory of Open Access Journals (Sweden)

    Gustavo Bordes Leone

    2014-01-01

    Full Text Available El deudor civil que, para substraerse al pago de sus obligaciones, ocultara sus bienes, simulara enajenaciones o créditos, se trasladara al extranjero o se ocultare sin dejar persona que lo represente, o bienes a la vista en cantidad suficiente para responder al pago de sus deudas, será castigado con pena de tres meses de prisión a tres años de penitenciaría. La acción penal no podrá ser ejercitada sino a denuncia de parte, y sólo en el caso de que la insolvencia del deudor resulte comprobada por actos infructuosos de ejecución en la vía civil.Antecedentes históricas. La insolvencia fraudulenta. Insolvencia societaria fraudulenta: Análisis crítico.

  10. [Viruses and civilization].

    Science.gov (United States)

    Chastel, C

    1999-01-01

    A few million years ago, when primates moved from the east African forest to the savannah, they were already infected with endogenous viruses and occultly transmitted them to the prime Homo species. However it was much later with the building of the first large cities in Mesopotamia that interhuman viral transmission began in earnest. Spreading was further enhanced with the organization of the Egyptian, Greek, Roman, and Arab empires around the Mediterranean. Discovery of the New World in 1492 led to an unprecedented clash of civilizations and the destruction of pre-Columbian Indian civilizations. It also led to a rapid spread of viruses across the Atlantic Ocean with the emergence of yellow fever and appearance of smallpox and measles throughout the world. However the greatest opportunities for worldwide viral development have been created by our present, modern civilization. This fact is illustrated by epidemic outbreaks of human immunodeficiency virus, Venezuela hemorrhagic fever, Rift valley fever virus, and monkey pox virus. Close analysis underscores the major role of human intervention in producing these events.

  11. Missile Defense: LBJ's Bid To Curb Arms Race Gains Support.

    Science.gov (United States)

    Carter, L J

    1967-04-14

    In the article of 31 March on antiballistic missile defense, the last sentence of paragraph 2, p. 1654, should read: "Manpower for producing . . . but the outer limit would be about 200,000, or half the number of contractor employees and civil servants working for NASA at the peak of the Apollo program."

  12. Aviation Research and the Internet

    Science.gov (United States)

    Scott, Antoinette M.

    1995-01-01

    The Internet is a network of networks. It was originally funded by the Defense Advanced Research Projects Agency or DOD/DARPA and evolved in part from the connection of supercomputer sites across the United States. The National Science Foundation (NSF) made the most of their supercomputers by connecting the sites to each other. This made the supercomputers more efficient and now allows scientists, engineers and researchers to access the supercomputers from their own labs and offices. The high speed networks that connect the NSF supercomputers form the backbone of the Internet. The World Wide Web (WWW) is a menu system. It gathers Internet resources from all over the world into a series of screens that appear on your computer. The WWW is also a distributed. The distributed system stores data information on many computers (servers). These servers can go out and get data when you ask for it. Hypermedia is the base of the WWW. One can 'click' on a section and visit other hypermedia (pages). Our approach to demonstrating the importance of aviation research through the Internet began with learning how to put pages on the Internet (on-line) ourselves. We were assigned two aviation companies; Vision Micro Systems Inc. and Innovative Aerodynamic Technologies (IAT). We developed home pages for these SBIR companies. The equipment used to create the pages were the UNIX and Macintosh machines. HTML Supertext software was used to write the pages and the Sharp JX600S scanner to scan the images. As a result, with the use of the UNIX, Macintosh, Sun, PC, and AXIL machines, we were able to present our home pages to over 800,000 visitors.

  13. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  14. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  15. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  16. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  17. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  18. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  19. The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism

    Directory of Open Access Journals (Sweden)

    Murdoch Watney

    2007-06-01

    Full Text Available Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which results in an unjustifiable infringement of civil rights. Since countries worldwide are focusing attention on the control of information on the Internet, the debate in respect of state control and the consequences of state control is relevant on a global level as it impacts on all Internet-connected countries.

  20. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  1. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  2. The Civil War Diet

    OpenAIRE

    Brennan, Matthew Philip

    2005-01-01

    The soldierâ s diet in the Civil War has been known as poor, and a number of illnesses and disorders have been associated with it. However, a nutritional analysis placed within the context of mid-nineteenth century American nutrition has been lacking. Such an approach makes clear the connection between illness and diet during the war for the average soldier and defines the importance of nutritionâ s role in the war. It also provides a bridge from the American diet to the soldier diet, ou...

  3. Transnationalising Civil Society?

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    The paper takes a transnational perspective on developing an analytical framework for understanding how transnationalism interacts with civil society and how immigrant organisations use transnational strategies to challenge the pre-given positions of immigrants within given integration......- and citizenship-regimes. Locating transnationalism as part of the political opportunity structure also indicates that the state(s) to some degree can facilitate transnationalism, directly and indirectly. A substantial part of political engagement now occurs via transnational channels. What is uncertain is to what...

  4. Internet - a resource for nuclear utilities

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Internet is the name of the largest computer network in the world. It is actually a collection of many networks all running the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, connected through gateways and sharing common names and address spaces. Its purpose is to facilitate sharing of resources at participating organizations, which include government agencies, educational institutions, and private corporations. The Internet roots begin with the creation of the Advanced Research Projects Agency (ARPA) within the U.S. Department of Defense (DOD) in 1958. In 1969, the DOD formed a computer network for ARPA and gave it the name ARPANET. It was designed to help government scientists communicate and share information by allowing remote computer log-in and program execution, but it quickly became a tool for sharing information through file transfer, electronic mail, and interest-group mailing lists. In 1970, ARPA became the Defense Advanced Research Projects Agency (DARPA) and ARPANET became DARPANET. By 1980, the DARPANET had grown in size, and other connecting networks were being developed. To support system growth and performance, it was recognized that a new communication protocol was required. In 1983, DARPANET split into DARPANET and MILNET (Military Network), and the Internet was formed when the Defense Communications Agency, which managed both networks, mandated the use of TCP/IP for connected hosts. In 1986, the National Science Foundation (NSF) joined Internet. The NSF created NSFNET to link several national supercomputer centers to support scholarly research. It now comprises 17 networks, connecting to 23 midlevel wide-area networks across the continent. In turn, the midlevel networks link computers in more than 1000 university, government, and commercial research organizations throughout the world

  5. The Challenges of Defense Support of Civil Authorities and Homeland Defense in the Cyber Domain

    Science.gov (United States)

    2013-05-20

    of-service attack lasting one week or longer. Medical life-support systems would fail and a devastating impact to the economy would occur with the...Information Grid ( GIG ) against a cyber attack has taken the forefront in national level discussions. The U.S. homeland’s assumed sanctuary against...other U.S. government agencies and key operators within the private sector to detect, deter, prevent, and thwart exploitation of CIKR and the GIG

  6. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    specific climatic challenge or clean the air. With nanotechnology, the artificial and the natural move closer together; this is the perspective for civil engineer Chris McCarthy’s work all over the world. And what is new is not just the way the construction materials are put together; they also require......Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...

  7. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...... theme in twentieth century architecture. Together, civil engineer Peter Rice and architect Ian Ritchie created a paradigm shift with their revolutionary ideas for glass facades supported by cables. Glued and bolted constructions made entirely of glass are now a reality in small-scale projects, yet...

  8. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  9. How persistent is civilization growth?

    OpenAIRE

    Garrett, Timothy J.

    2011-01-01

    In a recent study (Garrett, 2011), I described theoretical arguments and empirical evidence showing how civilization evolution might be considered from a purely physical basis. One implication is that civilization exhibits the property of persistence in its growth. Here, this argument is elaborated further, and specific near-term forecasts are provided for key economic variables and anthropogenic CO2 emission rates at global scales. Absent some external shock, civilization wealth, energy cons...

  10. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  11. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  12. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  13. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  15. Kingdom, church and civil society: A theological paradigm for civil ...

    African Journals Online (AJOL)

    This article deals with the role that churches can and should play in civil society to develop societal morally. The central-theoretical argument is that the biblical notion of the kingdom of God can, when it is systematically and theologically developed, offer an acceptable foundation for the civil action of churches. In light of this ...

  16. 21 CFR 1404.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Civil judgment. 1404.920 Section 1404.920 Food and...) Definitions § 1404.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  17. 22 CFR 208.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil judgment. 208.920 Section 208.920 Foreign...) Definitions § 208.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  18. 34 CFR 85.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Civil judgment. 85.920 Section 85.920 Education Office...) Definitions § 85.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  19. 28 CFR 31.202 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 31.202 Section 31.202....202 Civil rights. (a) To carry out the State's Federal civil rights responsibilities the plan must: (1) Designate a civil rights contact person who has lead responsibility in insuring that all applicable civil...

  20. 2 CFR 180.915 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Civil judgment. 180.915 Section 180.915... § 180.915 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  1. 22 CFR 1006.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1006.920 Section 1006.920...) Definitions § 1006.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  2. 22 CFR 1508.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1508.920 Section 1508.920...) Definitions § 1508.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of... creates a civil liability for the complained of wrongful acts, or a final determination of liability under...

  3. The paradox of civilizing

    DEFF Research Database (Denmark)

    Gilliam, Laura

    As in most other European Countries, immigrants from “non-Western” countries are increasingly perceived as a threat to integration, equality and harmony in Danish society. Especially the immigrant boys are depicted as aggressive, troublesome and in lack of social competencies. This makes this group...... minority youngsters, which are seen as a threat to the stability and harmony of Danish society. Based on ethnographic material from 11 months of fieldwork among ethnic minority pupils in two schools in Copenhagen, this paper will look into the schools’ effort to civilize youth of outsider status. Through....... For their part, the boys - in search of alternative strength and recognition - invert the image of good behavior presented to them by the school, and come to identify strongly with aggression, rude language and tough masculinity. Drawing on Elias’ discussions of dominant group’s efforts to both integrate...

  4. Departamento de Obras Civiles

    OpenAIRE

    Director Departamento de Obras Civiles

    1984-01-01

    Es la unidad académica que se crea como estructura básica para la formación profesional del Constructor Civil. El departamento está orientado a las siguientes áreas: Obras Viales, Fluviales y Marítimas; Hormigones y Mecánica de Suelos; Laboratorios y Control de Calidad; Planificación y Programación; Administración; Organización y Gestión Financiera, conocimientos insertos en un total de 33 asignaturas, prácticas y seminarios siendo equivalentes a más de 100 créditos, lo cual representa un 42%...

  5. Senate report on the bill authorizing joining the 2001 International Convention on Civil Liability for Bunker Oil Pollution Damage; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees (1) sur le projet de loi, Adopte par l'Assemblee Nationale, autorisant l'adhesion a la convention internationale de 2001 sur la responsabilite civile pour les dommages dus a la pollution par les hydrocarbures de soute

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    This report recalls the different texts concerning the law of the sea: United Nations Convention on the Law of the Sea (UNCLOS) of 1982 which was ratified by France in 1996, the International Convention on Civil Liability for Oil Pollution of 1992, the creation of the International Oil Pollution Compensation Funds, and the International Convention on Liability and Compensation for Damage in Connection with the Carriage of Hazardous and Noxious Substances by sea (HNS) in 1996. While evoking some recent examples of wrecks and pollutions and some already existing French and European initiatives, it describes the implications and consequences of this convention on the French law and for its enforcement, provided that this new treaty is designed to take bunker oil into account as it may induce a significant pollution of the marine environment

  6. Journal of Civil Engineering, JKUAT

    African Journals Online (AJOL)

    The Journal of Civil Engineering, JKUAT aims to publish definitive and original research papers of high standard, containing material of broad interest and of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems. It provides a forum for ...

  7. Civil works for NPPs construction

    International Nuclear Information System (INIS)

    Portenseigne, Christophe

    2014-01-01

    Christophe Portenseigne, Technical Director of Bouygues Travaux Publics, provided explanations on the main challenges of Civil work for the construction of the 3. generation of NPPs. He then provided an overview of the new Civil Work concepts for the 4. generation of NPPs

  8. Environmental Ethics and Civil Engineering.

    Science.gov (United States)

    Vesilind, P. Aarne

    1987-01-01

    Traces the development of the civil engineering code of ethics. Points out that the code does have an enforceable provision that addresses the engineer's responsibility toward the environment. Suggests revisions to the code to accommodate the environmental impacts of civil engineering. (TW)

  9. Civil Engineering Technology Needs Assessment.

    Science.gov (United States)

    Oakland Community Coll., Farmington, MI. Office of Institutional Planning and Analysis.

    In 1991, a study was conducted by Oakland Community College (OCC) to evaluate the need for a proposed Civil Engineering Technology program. An initial examination of the literature focused on industry needs and the job market for civil engineering technicians. In order to gather information on local area employers' hiring practices and needs, a…

  10. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  11. Sustainability issues in civil engineering

    CERN Document Server

    Saride, Sireesh; Basha, B

    2017-01-01

    This compilation on sustainability issues in civil engineering comprises contributions from international experts who have been working in the area of sustainability in civil engineering. Many of the contributions have been presented as keynote lectures at the International Conference on Sustainable Civil Infrastructure (ICSCI) held in Hyderabad, India. The book has been divided into core themes of Sustainable Transportation Systems, Sustainable Geosystems, Sustainable Environmental and Water Resources and Sustainable Structural Systems. Use of sustainability principles in engineering has become an important component of the process of design and in this context, design and analysis approaches in civil engineering are being reexamined to incorporate the principles of sustainable designs and construction in practice. Developing economies are on the threshold of rapid infrastructure growth and there is a need to compile the developments in various branches of civil engineering and highlight the issues. It is th...

  12. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  13. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  14. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  15. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the agreement approbation between the French Republic Government and the Russian Federal Government relative to the civil liability concerning the nuclear damages occurring from goods supplying to nuclear facilities in Russian Federation and becoming from the French Republic

    International Nuclear Information System (INIS)

    2002-01-01

    The first part presents the international civil liability system in the nuclear domain and details then the 20 june 2000 agreement. It presents also the main aspects of the french-russian cooperation in the nuclear domain. (A.L.B.)

  16. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  17. Lineage of global civil engineering. Global civil engineering no keifu

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, M

    1994-04-15

    This paper considers which way the global civil engineering should go in the future. Civil engineering has now a paradigm with a new dimension debuted as the global environmental problems are taken up specifically. Achieving the target of civil engineering requires a critical review that how the cost effect and efficiency discussions in only the dimensions of the conventional technologies and economies can be incorporated into the dimensions and measures of new fields to create the new horizons. Conceiving the relationship between civil engineered structures and environmental climate encounters the indispensable judgment criterion on how such social scientific conditions as weather, culture, religion, economy, and politics are combined to reach a judgment. The global civil engineering is desired to have the ideas and directional role to work on the ultimate assignment of environment and development called a global environmental problem analytically, comprehensively, innovatively and creatively as the civil engineering science, rather than as a mere existence of one area of the advanced civil engineering science. 5 refs., 1 tab.

  18. Developing Civil-Military Competencies Among Senior National Security Practitioners in Democratizing Latin America

    Science.gov (United States)

    2008-01-01

    President Raul Alfonsin did not retaliate against the military. Nor did President Carlos Menem in the 1990s. There was no question in either of these...1 Herbert C. Huser, Argentine Civil-Military Relations: From Alfonsin to Menem (Washington, DC: National Defense University Press, 2002

  19. Boundaries - US Army Corps of Engineers - St. Paul District (MVP) Civil Works

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — The US Army Corps of Engineers - St. Paul District Civil Works boundary. Boundary is based on 1:24k watershed data and coordination with MVR to determine shared...

  20. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  1. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  2. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  3. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  4. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  5. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  6. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  7. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  8. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  9. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  10. Civil liberties and nuclear terrorism

    International Nuclear Information System (INIS)

    Goldberg, S.

    1987-01-01

    The importance of preventing nuclear terrorism is so great that it is easy to believe that the usual concern with civil liberties must take a back seat. But it is precisely when emergencies are invoked that the authors must not forget the importance of freedoms. Emergency powers are easily abused, and, even in the absence of abuse, mistakes can be made. It is hard to understand why they care about civil liberties if every suspect is guilty, every wiretap is necessary, and every search is justified. But sometimes suspects are innocent, wiretaps are used for political ends, and searches disrupt lives to no end. Civil liberties do not exist in a vacuum. If society is destroyed, civil liberties are likely to be destroyed as well. Virtually every legal doctrine this study addresses involves a recognition that individual rights must be balanced against valid social needs. The civil liberties focus on here fall under the general headings of freedom of speech and association, privacy, due process rights for suspects, and freedom from unreasonable searches and seizures. One essential point applied to all these areas: although a counterterrorist activity is legal, that does not mean the activity has no impact on civil liberties. It may be legal, for example, to have a massive federal police force that provides hundreds of guards for every shipment of plutonium. Even so, that procedure still raises civil liberties concerns, since many Americans would feel less free in a society of that type

  11. Material civilization: things and society.

    Science.gov (United States)

    Dant, Tim

    2006-06-01

    This paper argues that although classical sociology has largely overlooked the importance of social relations with the material world in shaping the form of society, Braudel's concept of 'material civilization' is a useful way to begin to understand the sociological significance of this relationship. The limitations of Braudel's historical and general concept can be partially overcome with Elias's analysis of the connection between 'technization' and 'civilization' that allows for both a civilizing and a de-civilizing impact of emergent forms of material relation that both lengthen and shorten the chains of interdependence between the members of a society. It is suggested that the concept of the 'morality of things' employed by a number of commentators is useful in summarizing the civilizing effects of material objects and addressing their sociological significance. From the sociology of consumption the idea of materiality as a sign of social relationships can be drawn, and from the sociology of technology the idea of socio-technical systems and actor-networks can contribute to the understanding of material civilization. It is argued that the concept of 'material capital' can usefully summarize the variable social value of objects but to understand the complexity of material civilization as it unfolds in everyday life, an analysis of 'material interaction' is needed. Finally the paper suggests some initial themes and issues apparent in contemporary society that the sociological study of material civilization might address; the increased volume, functional complexity and material specificity of objects and the increased social complexity, autonomy and substitutability that is entailed. A theory of 'material civilization' is the first step in establishing a sociology of objects.

  12. Nuclear war and other catastrophes. Civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945; Atomkrieg und andere Katastrophen. Zivil- und Katastrophenschutz in der Bundesrepublik und Grossbritannien nach 1945

    Energy Technology Data Exchange (ETDEWEB)

    Diebel, Martin [Zentrum fuer Zeithistorische Forschung, Potsdam (Germany)

    2017-07-01

    The book civil and catastrophe protection in the Federal republic of Germany and the United Kingdom after 1945 discusses the following issues: aerial defense and the atomic bomb (1945 - 1968), crises and catastrophes in the shadow of the bomb (1962 - 1978), civil defense and the comeback of the (nuclear) war (1976 - 1979), civil defense and the second ''Cold War'' (1979 - 1986), Chernobyl and the end of the Cold War (1979 - 1990), war, catastrophe and safety in the 20th century - a conclusion.

  13. Julgamentos parciais no processo civil

    OpenAIRE

    Antonio Carlos Nachif Correia Filho

    2015-01-01

    Este trabalho trata fundamentalmente da admissibilidade dos julgamentos parciais do mérito e de questões de mérito no sistema processual civil brasileiro, considerando especialmente o modelo constitucional de processo civil, bem como no sistema processual prospectivo previsto no Projeto de Novo Código de Processo Civil, que deve entrar vigor em breve. Com este objetivo, será abordado no início da dissertação o dogma da unidade estrutural da sentença, sua origem, fundamentos e aplicabilidade n...

  14. Civil liability on nuclear activities; Responsabilidade civil nas atividades nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Bittar, C A

    1983-12-31

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs.

  15. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  16. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  17. Proactive Botnet Detection and Defense at Internet scale

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Pras, Aiko; Dreo, G.

    Botnets provide the basis for various cyber-threats. However, setting up a complex botnet infrastructure often involves registration of domain names in the domain name system (DNS). Active as well as passive monitoring approaches can be used in the detection of domains that are registered for

  18. Radiation protection in civil defence

    International Nuclear Information System (INIS)

    Ahlborn, K.

    The brochure contains the information given to the participants of an advanced training course in civil defence, on the subject of radiation protection. The course was held by teachers of Bundesverband fuer den Selbstschutz (BVS). (orig.) [de

  19. Teaching Mathematics to Civil Engineers

    Science.gov (United States)

    Sharp, J. J.; Moore, E.

    1977-01-01

    This paper outlines a technique for teaching a rigorous course in calculus and differential equations which stresses applicability of the mathematics to problems in civil engineering. The method involves integration of subject matter and team teaching. (SD)

  20. Librarians, Civil Liberties and Privacy.

    Science.gov (United States)

    Fielding, Derek

    1978-01-01

    A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)

  1. Algeria: An Uncivilized Civil War

    National Research Council Canada - National Science Library

    Robling, Terry

    1995-01-01

    .... Moderates on both sides are seeking peace from the undeclared civil war that resulted when the military-backed regime canceled elections that Islamic fundamentalists were certain to win in 1992...

  2. High technology and civil rights

    International Nuclear Information System (INIS)

    Lerche, P.

    1982-01-01

    Court decision reflect the widely felt lack of clarity about the present legal situation in the field of high technology. This confusion is also due to the fact that this legal situation is surrounded by civil rights constellations, which have more and more eroded the contours of our legal system in recent years: Today, civil rights are no longer specific, well-definable bulwarks for the citizen, but are more and more frequently interpreted by the supreme courts as sources of procedural requirements with more or less certain often vague consequences. This shifting of the accent in civil rights towards procedural matters is due to an innate logical necessity, however: The same civil right considered in the same situation, e.g., in planning for high technology, may give rise to very different, even contradictory individual claims. Therefore, one of the main modern objectives of civil rights becoming more and more apparent is the need to reconcile conflicting positions, which makes civil rights a driving force in balancing interests in the easiest possible way. Yet, one of the main deficiencies in this rapidly growing procedural approach is the one-sidedness often to be found as a result of isolated, punctual actions. This misses the objective of achieving adequate harmonization. As examples of such one-sided, isolated civil rights approaches, legal opinions are cited on the so-called public participation (possibility to object for those concerned) in the licensing procedures under the German Atomic Energy Act and for protection against environmental impacts. Quity rightly, this participation of the public is interpreted as an advance protection of civil rights. However, its consequences quite often are exaggerated. (orig.) [de

  3. Civil liability on nuclear activities

    International Nuclear Information System (INIS)

    Bittar, C.A.

    1982-01-01

    The civil liability theory in the actual context is shown in the first and second part of this thesis, including some considerations about concepts and types of liability in dangerous and not dangerous activities. In the third part, the legal aspects of civil liability for the nuclear activities are analyzed, with a brief description of the history evolution, standard systems, inspection corporation and juridical regulation. (C.G.C.). 239 refs

  4. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  5. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  6. A PROMISING MECHANISM FOR FINANCING THE NATIONAL ECONOMY, SECURITY AND DEFENSE OF UKRAINE

    OpenAIRE

    Dmitry Klinovoi, Peter Rogov

    2017-01-01

    The principles of the permanent financing of necessities of state development, national safety and defensive due to forming of legal institute of civil property on natural resources and mechanisms of the sovereign financing by receivabless from natural rent are grounded here. The description of sovereign fund and fund of civil dividends as institutes of accumulation of state facilities and management of assets is given here.

  7. Civility in scientific publishing: The glyphosate paper.

    Science.gov (United States)

    Blaylock, Russell Lane

    2015-01-01

    In recent years, we have witnessed a decline in civility in the public arena when various socially sensitive issues are being presented. Those of us engaged in the publishing of scientific papers and in our comments on these papers, need to be cognizant of the social graces, courteous demeanor, and chivalry. Debates are essential to our learning and in being able to ferret out the essentials of various scientific issues that are of value. Because of the amount of time and effort connected with analyzing the complex problems and the years invested in such endeavors, we often resort to the behavior, that is, contentious and at times even quite insulting to our opponents during our defense. This is the part of human nature but as civilized human beings, we must strive to maintain the courtesy and a calm demeanor during such discussions and debates. I have yielded to such temptations myself but am striving to repent of my sins. The medical and scientific history should have taught us that in defending our ideas we learn and sometimes come to the realization that our paradigm or hypothesis is wrong, either in part or whole. Such debates allow us to fine tune our ideas and correct our errors in thinking, which are easily, consciously, or subconsciously sublimated by our enthusiasm. The glyphosate papers presented ideas that, while well supported by the scientific studies and logical conclusions, also contained some possible errors in its suppositions. Dr. Miguel Faria challenged some of these concepts and was met with some degree of derision by one of the authors. This editorial comment is in response to these issues.

  8. 30 CFR 947.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 947.845 Section 947.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE WASHINGTON § 947.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  9. 30 CFR 941.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 941.845 Section 941.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE SOUTH DAKOTA § 941.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  10. 30 CFR 912.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 912.845 Section 912.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE IDAHO § 912.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  11. 30 CFR 921.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 921.845 Section 921.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MASSACHUSETTS § 921.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  12. 30 CFR 939.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 939.845 Section 939.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE RHODE ISLAND § 939.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for...

  13. 30 CFR 937.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 937.845 Section 937.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE OREGON § 937.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  14. 30 CFR 942.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 942.845 Section 942.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE TENNESSEE § 942.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  15. 30 CFR 903.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 903.845 Section 903.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE ARIZONA § 903.845 Civil penalties. Part 845 of this chapter, Civil Penalties, applies to the assessment of civil penalties for violations...

  16. 30 CFR 910.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 910.845 Section 910.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE GEORGIA § 910.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  17. 30 CFR 922.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 922.845 Section 922.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE MICHIGAN § 922.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply when civil penalties are assessed for violations...

  18. 30 CFR 933.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 933.845 Section 933.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE NORTH CAROLINA § 933.845 Civil penalties. Part 845 of this chaper, Civil Penalties, shall apply when civil penalties are assessed for...

  19. 30 CFR 905.845 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil penalties. 905.845 Section 905.845... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE CALIFORNIA § 905.845 Civil penalties. Part 845 of this chapter, Civil Penalties, shall apply to the assessment of civil penalties for...

  20. 5 CFR 919.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Civil judgment. 919.920 Section 919.920 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 919.920 Civil judgment. Civil judgment...

  1. 29 CFR 98.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Civil judgment. 98.920 Section 98.920 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction...

  2. 7 CFR 3017.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil judgment. 3017.920 Section 3017.920 Agriculture... AGRICULTURE GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 3017.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether...

  3. 14 CFR 1274.924 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil rights. 1274.924 Section 1274.924... FIRMS Other Provisions and Special Conditions § 1274.924 Civil rights. Civil Rights July 2002 Work on NASA cooperative agreements is subject to the provisions of Title VI of the Civil Rights Act of 1964...

  4. 29 CFR 1471.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Civil judgment. 1471.920 Section 1471.920 Labor Regulations... SUSPENSION (NONPROCUREMENT) Definitions § 1471.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  5. 31 CFR 19.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil judgment. 19.920 Section 19.920... SUSPENSION (NONPROCUREMENT) Definitions § 19.920 Civil judgment. Civil judgment means the disposition of a civil action by any court of competent jurisdiction, whether by verdict, decision, settlement...

  6. Communication Needs of Thai Civil Engineering Students

    Science.gov (United States)

    Kaewpet, Chamnong

    2009-01-01

    This article reports on an examination of the communication needs of a group of Thai civil engineering students. Twenty-five stakeholders helped identify the communication needs of the students by participating in individual interviews. These included employers, civil engineers, civil engineering lecturers, ex-civil engineering students of the…

  7. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  8. Space civil engineering - A new discipline

    Science.gov (United States)

    Sadeh, Willy Z.; Criswell, Marvin E.

    1991-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding the Civil Engineering know-how and practice to the development and maintenance of infrastructure on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University under a recently established NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts of the curriculum in the Space Civil Engineering Option at both undergraduate and graduate levels are presented. The role of Space Civil Engineering in the Space Program is discussed.

  9. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  10. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  11. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  12. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  13. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  14. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  15. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  16. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  17. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  18. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  19. Rezension: World Wide War: Angriff aus dem Internet/Cyber War: The Next Threat to National Security and What to Do About It von Richard A. Clarke und Robert K. Knake/by Richard A. Clarke and Robert K. Knake

    Directory of Open Access Journals (Sweden)

    Karl H. Stingeder

    2015-03-01

    Full Text Available Je breiter der Infrastruktur-Anschluss eines Landes an das World Wide Web, desto größer die Angriffsfläche im Fall eines Netzkriegs. Die Messung der virtuellen Kampfkraft erfolgt auf Basis von drei Faktoren: Offensivkraft, Defensivfähigkeit und die Abhängigkeit vom Internet. Die USA verfügen als "Supermacht" zwar über die größte virtuelle Offensivkraft, gleichzeitig steht die Nation Cyberangriffen sehr verwundbar gegenüber. Dagegen sind in Nordkorea kaum Systeme vom Internet abhängig. Obwohl die offensiven Netzkriegskapazitäten Nordkoreas verhältnismäßig gering sind, präsentiert sich die virtuelle Kampfkraft des nordkoreanischen Regimes in Bestform. Die Verwundbarkeit ziviler Systeme, insbesondere der Energieversorgung, muss in direkter Korrelation mit deren Anknüpfung an das Internet betrachtet werden. The more broadly connected a country’s infrastructure and energy distribution, the greater its vulnerability in the event of a cyber war. Measuring this virtual fighting power is based on three factors: offensive and defensive strength, as well as dependency on the Internet. As a superpower, the USA has the greatest virtual offensive strength available. At the same time, the nation is most susceptible to cyber attacks and therefore most vulnerable. By contrast, North Korea’s offensive cyber fighting power is relatively small, but its overall cyber war capabilities are cutting-edge. The vulnerability of civil systems, especially power supply, must be viewed in direct correlation to their connection to the Internet.

  20. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  1. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  2. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  3. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  4. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  5. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  6. The International Criticality Safety Benchmark Evaluation Project on the Internet

    International Nuclear Information System (INIS)

    Briggs, J.B.; Brennan, S.A.; Scott, L.

    2000-01-01

    The International Criticality Safety Benchmark Evaluation Project (ICSBEP) was initiated in October 1992 by the US Department of Energy's (DOE's) defense programs and is documented in the Transactions of numerous American Nuclear Society and International Criticality Safety Conferences. The work of the ICSBEP is documented as an Organization for Economic Cooperation and Development (OECD) handbook, International Handbook of Evaluated Criticality Safety Benchmark Experiments. The ICSBEP Internet site was established in 1996 and its address is http://icsbep.inel.gov/icsbep. A copy of the ICSBEP home page is shown in Fig. 1. The ICSBEP Internet site contains the five primary links. Internal sublinks to other relevant sites are also provided within the ICSBEP Internet site. A brief description of each of the five primary ICSBEP Internet site links is given

  7. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  8. Civil liability for nuclear damage

    International Nuclear Information System (INIS)

    1963-01-01

    An international Convention on Civil Liability for Nuclear Damage was adopted in Vienna on 19 May 1963 by a sixty-nation conference convened by the International Atomic Energy Agency. The Convention, which is subject to ratification by the States signing it, will come into force three months after the deposit of the fifth instrument of ratification. The Convention is designee only to establish minimum rules regarding civil liability for nuclear damage; it may thus well be described as a framework convention, the main provisions of which represent the essential common denomination acceptable to as many States as possible. It leaves wide scope for national legislation and regional arrangements with a view to implementing these provisions The Convention does not purport to create a uniform civil law in this field, but it contains the minimal essential for protection of the public and forms the legal basis for uniform world-wide liability rules

  9. Artificial Intelligence in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Pengzhen Lu

    2012-01-01

    Full Text Available Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applications of artificial intelligence in civil engineering, including evolutionary computation, neural networks, fuzzy systems, expert system, reasoning, classification, and learning, as well as others like chaos theory, cuckoo search, firefly algorithm, knowledge-based engineering, and simulated annealing. The main research trends are also pointed out in the end. The paper provides an overview of the advances of artificial intelligence applied in civil engineering.

  10. Global Standards of Market Civilization

    DEFF Research Database (Denmark)

    Global Standards of Market Civilization brings together leading scholars, representing a range of political views, to investigate how global 'standards of market civilization' have emerged, their justification, and their political, economic and social impact. Key chapters show how as the modern...... thought, as well as its historical application part II presents original case studies that demonstrate the emergence of such standards and explore the diffusion of liberal capitalist ideas through the global political economy and the consequences for development and governance; the International Monetary...... Fund's capacity to formulate a global standard of civilization in its reform programs; and problems in the development of the global trade, including the issue of intellectual property rights. This book will be of strong interest to students and scholars in wide range of fields relating to the study...

  11. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  12. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  13. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  14. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  15. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  16. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  17. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  18. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  19. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  20. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  1. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  2. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  3. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  4. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  5. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  6. On civil engineering disasters and their mitigation

    Science.gov (United States)

    Xie, Lili; Qu, Zhe

    2018-01-01

    Civil engineering works such as buildings and infrastructure are the carriers of human civilization. They are, however, also the origins of various types of disasters, which are referred to in this paper as civil engineering disasters. This paper presents the concept of civil engineering disasters, their characteristics, classification, causes, and mitigation technologies. Civil engineering disasters are caused primarily by civil engineering defects, which are usually attributed to improper selection of construction site, hazard assessment, design and construction, occupancy, and maintenance. From this viewpoint, many so-called natural disasters such as earthquakes, strong winds, floods, landslides, and debris flows are substantially due to civil engineering defects rather than the actual natural hazards. Civil engineering disasters occur frequently and globally and are the most closely related to human beings among all disasters. This paper emphasizes that such disasters can be mitigated mainly through civil engineering measures, and outlines the related objectives and scientific and technological challenges.

  7. Cyber Defense Exercises and their Role in Cyber Warfare

    OpenAIRE

    Bogdan Alexandru Bratosin

    2014-01-01

    The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exer...

  8. Integrated Cyber Defenses: Towards Cyber Defense Doctrine

    Science.gov (United States)

    2007-12-01

    and spam filters, mail relays, antivirus /antimalware software , router Access Control Lists (ACLs), cryptography and encryption, user access... Cisco ), network protocols (like TCP/IP [Transmission Control Protocol/Internet Protocol]), programs, programming languages (like C++, Java, ActiveX...rules were built into them. Since these are human-made rules, they can be changed by replacing or updating hardware and/or software . Unlike the

  9. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  10. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  11. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  12. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  13. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  14. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  15. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  16. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  17. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  18. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  19. Civil liability concerning nuclear accidents

    International Nuclear Information System (INIS)

    Anon.

    2013-01-01

    France and the USA wish to cooperate in order to promote an international regime of civil liability in order to give a fair compensation to victims of nuclear accidents as it is recommended by IAEA. On the other hand the European Commission has launched a consultation to see the necessity or not to harmonize all the civil liability regimes valid throughout Europe. According to the Commission the potential victims of nuclear accidents would not receive equal treatment at the European scale in terms of insurance cover and compensation which might distort competition in the nuclear sector. (A.C.)

  20. OVERVIEW OF RUSSIAN CIVIL JUSTICE

    Directory of Open Access Journals (Sweden)

    D. Maleshin

    2016-01-01

    Full Text Available Contemporary Russian civil procedure is not a pure Continental model because it also has procedural features of the common law system, as well as some other original and exceptional features. This article examines the main aspects of Russian civil justice: its main principles; judicial organization, including the structure of the courts and the division between courts of general jurisdiction and arbitrazh (commercial courts, and the Intellectual Property Court; sources of procedural law; bar organization; the jurisdiction of the courts; actions and proceedings; legal costs; evidence; administrative procedure; class actions; enforcement proceedings; and arbitration and mediation.

  1. AV-8B Remanufacture Program as Part of the Audit of the Defense Acquisition Board Review Process - FY 1994

    Science.gov (United States)

    1994-06-03

    wft*:¥A:ft:i:ft& OFFICE OF THE INSPECTOR GENERAL AV-8B REMANUFACTURE PROGRAM AS PART OF THE AUDIT OF THE DEFENSE ACQUISITION BOARD...Part of the Audit of the Defense Acquisition Board Review Process - FY 1994 B. DATE Report Downloaded From the Internet: 03/23/99 C. Report’s Point...NAVY FOR RESEARCH DEVELOPMENT AND ACQUISITION SUBJECT: Audit Report on the AV-8B Remanufacture Program as Part of the Audit of the Defense

  2. Evaluating Options for Civil Space Situational Awareness (SSA)

    Science.gov (United States)

    Lal, B.; Carioscia, S. A.

    In recent years, the number of active satellites and human-made orbital space debris has increased dramatically. An expansion of activities in space, as is currently being proposed by many commercial and international entities, is expected to further exacerbate this challenge. The 18th Space Control Squadron under the Department of Defense (DOD) United States Strategic Command provides space situational awareness (SSA) services to users outside the national security community at no cost. International and commercial users demand better SSA service than is currently feasible, and the demand comes at a time when DOD is under pressure to better prepare for and respond to growing space-based threats to national security. Concerned about the possibility of overextending across conflicting missions in a fiscally constrained environment, some DOD officials have publicly noted a desire to move SSA services not related to national security out of DOD purview. Responding to a request from the Federal Aviation Administration (FAA) Office of Commercial Space Transportation (AST), researchers at the Science and Technology Policy Institute (STPI) identified and evaluated potential approaches for providing SSA services for civil and commercial operations in space. In this paper, we summarize the report [1] and present the pros and cons of four approaches to the provision of civil SSA services in the United States: (1) maintaining status quo through continued provision by DOD; (2) provision by a civil government entity; (3) industry self-provision; and (4) provision by an international organization. Within the second approach, assuming the provision of SSA by a civil agency, STPI further identified and discussed four options: (1) civil agency service capability embedded within DOD; (2) independent civil service capability, using DOD software and systems; (3) independent civil service capability, using commercial software and systems; and (4) the government certifies non

  3. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  4. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  5. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  6. Space Civil Engineering option - A progress report

    Science.gov (United States)

    Criswell, Marvin E.; Sadeh, Willy Z.

    1992-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding Civil Engineering to the development, operation, and maintenance of infrastructures on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University and with support of the NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts and the current status of the curriculum in the Space Civil Engineering Option primarily at the undergraduate level are presented.

  7. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  8. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  9. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  10. Arguments completed in suit over Internet censorship.

    Science.gov (United States)

    1996-05-31

    Closing remarks on the Communications Decency Act, requiring Internet providers to censor materials that may be unsuitable for minors, were heard on May 10, 1996. The American Civil Liberties Union (ACLU) is leading the challenge to the law. Because information about HIV necessarily must deal with sexual practices, HIV/AIDS service providers would be forced to either avoid talking about the subject or find ways to prevent minors from accessing the information. During the oral arguments, U.S. Justice Department attorney Anthony Coppolino tried to show that the Internet is more like a broadcast medium such as television or radio and is different from newspapers, which enjoy a constitutional protection against government censorship. ACLU attorney Christopher Hansen disagreed, saying the reverse is true. The ACLU said parental control mechanisms such as SurfWatch, Net Nanny, and Cyberpatrol are commercially available to parents who wish to restrict their children's Internet access and are more effective than the government's proposal. The court is expected to rule on the lawsuit in several weeks. An appeal to the U.S. Supreme Court is expected, regardless of the outcome.

  11. The Civil War and Iowa.

    Science.gov (United States)

    Gore, Deborah, Ed.

    1987-01-01

    This journal issue explores Iowa's participation in the U.S. Civil War and primarily focuses on what happened to the men, women, and children who remained at home. A number of social, political, and economic changes are examined, including: (1) the increased responsibilities of women and children; (2) the growth of abolitionism; (3) the role of…

  12. Governance and European Civil Society

    DEFF Research Database (Denmark)

    Kutay, Acar

    This book provides a critical analysis of the European Union’s approach to ‘governance’, focusing on the way in which civil society is incorporated within the EU decision-making process and arguing that it is not conducive to the democratisation of EU governance.\

  13. Promoting Civil Discourse on Campus

    Science.gov (United States)

    Bornstein, Rita

    2010-01-01

    During the past several decades, off campus and on, much of the discourse on controversial issues has been personal, vicious, and divisive. On the national scene, politics has become permeated with incivility. It now appears that Americans have been naive about their ability and willingness to engage in civil discourse and compromise. How can…

  14. Measuring competition in civil aviation

    NARCIS (Netherlands)

    Lijesen, M.G.; Nijkamp, P.; Rietveld, P.

    2002-01-01

    Markets in civil aviation are characterized by large differences in the level of competition, both between time periods as between regions. To measure competition, several indicators are available, such as the number of competitors, the C4-index and the Herfindahl index. We use these measures in

  15. Ancient Civilization in Contemporary Contexts.

    Science.gov (United States)

    Natunewicz, Chester F.

    The development of more than 325 short radio talks, designed to inform the general public, on the relevance and contemporaneity of classical civilization to our times, is discussed in this address. Materials are derived from a wide range of sources and include such writers as Cicero, Plautus, Horace, Ovid, Quintillian, Aeschylus, and Plutarch.…

  16. Job Prospects for Civil Engineers.

    Science.gov (United States)

    Basta, Nicholas

    1985-01-01

    Government programs and renewed industrial activity have combined with stable enrollments to create bright job prospects for civil engineers. Areas with good opportunities include highway reconstruction and rehabilitation, water-resource management, and new factory construction. The subspecialty of structural engineering has a growing need in…

  17. Civil Engineering Technology Program Guide.

    Science.gov (United States)

    Georgia Univ., Athens. Dept. of Vocational Education.

    This program guide presents civil engineering technology curriculum for technical institutes in Georgia. The general information section contains the following: purpose and objectives; program description, including admissions, typical job titles, and accreditation and certification; and curriculum model, including standard curriculum sequence and…

  18. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  19. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  20. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  1. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  2. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  3. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  4. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  5. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  6. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  7. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  8. Internet map of the Hungarian nuclear field

    International Nuclear Information System (INIS)

    Besenyei, Elisabeth

    2001-01-01

    The increasing role of Internet in the dissemination of information cannot be questioned. The organisations dealing with public information have to face with this challenge. New methods and ways are needed in order to effectively use this opportunity. An effective communication requires certain knowledge on the characteristics of the target group. The present situation on the Internet use in Hungary has been studied by a number of public opinion polls. In Europe Hungary is the eleventh in the row concerning the population percentage of Internet users. At the same time it is hard to define the exact number as it is continuously increasing. From the public opinion polls it can be seen that about 49 % of active Internet users, about 37 percent seek for information on the Internet. The organisations playing role in nuclear field includes nuclear facilities, research institutes, regulatory bodies as well as civil associations. Almost all of them realised the importance of the appearance on the Internet and have their web site. Among the web-sites of the Hungarian nuclear facilities the new home page of the Paks NPP (www.npp.hu) is especially well designed and worth to visit. The Atomic Energy Research Institute operates the 10 MW Budapest Research Reactor. The main features of the reactor can be found on the web site of the institute (www.kfki.hu/~aekihp/). Information about the research possibilities of the training reactor of the Institute of Nuclear Techniques of the Technical University of Budapest is provided on the web site (www.reak.bme.hu). The web site of the Hungarian Atomic Energy Authority (www.haea.gov.hu) has been renewed recently. Certainly, the list of the web sites of the Hungarian organisations active in nuclear field cannot be complete as it is a continuously evolving area. Nevertheless one can see that the players realised the importance of the challenge given by the Internet. While considerable effort is needed to maintain and refresh the web site

  9. Climate Change and Civil Violence

    Science.gov (United States)

    van der Vink, G.; Plancherel, Y.; Hennet, C.; Jones, K. D.; Abdullah, A.; Bradshaw, J.; Dee, S.; Deprez, A.; Pasenello, M.; Plaza-Jennings, E.; Roseman, D.; Sopher, P.; Sung, E.

    2009-05-01

    The manifestations of climate change can result in humanitarian impacts that reverse progress in poverty- reduction, create shortages of food and resources, lead to migration, and ultimately result in civil violence and conflict. Within the continent of Africa, we have found that environmentally-related variables are either the cause or the confounding factor for over 80% of the civil violence events during the last 10 years. Using predictive climate models and land-use data, we are able to identify populations in Africa that are likely to experience the most severe climate-related shocks. Through geospatial analysis, we are able to overlay these areas of high risk with assessments of both the local population's resiliency and the region's capacity to respond to climate shocks should they occur. The net result of the analysis is the identification of locations that are becoming particularly vulnerable to future civil violence events (vulnerability hotspots) as a result of the manifestations of climate change. For each population group, over 600 social, economic, political, and environmental indicators are integrated statistically to measures the vulnerability of African populations to environmental change. The indicator time-series are filtered for data availability and redundancy, broadly ordered into four categories (social, political, economic and environmental), standardized and normalized. Within each category, the dominant modes of variability are isolated by principal component analysis and the loadings of each component for each variable are used to devise composite index scores. Comparisons of past vulnerability with known environmentally-related conflicts demonstrates the role that such vulnerability hotspot maps can play in evaluating both the potential for, and the significance of, environmentally-related civil violence events. Furthermore, the analysis reveals the major variables that are responsible for the population's vulnerability and therefore

  10. American Society of Civil Engineers | ASCE

    Science.gov (United States)

    Membership Your New Membership: Getting Started Member Value Civil Engineering Salaries Manage Your Account Vote Now Education & Careers Training & Courses Getting Licensed & Certified Live Exam Reviews Specialty Certifications Civil Engineering Body of Knowledge Volunteer Opportunities Jobs Ethics

  11. Journal of Civil Engineering Research and Practice

    African Journals Online (AJOL)

    The Journal of Civil Engineering Research and Practice aims to publish original research papers of high standard, containing material of significant contribution to civil engineering, with emphasis being placed on material that is applicable to the solution of practical problems.

  12. Journal of Civil Engineering, JKUAT: Journal Sponsorship

    African Journals Online (AJOL)

    Journal of Civil Engineering, JKUAT: Journal Sponsorship. Journal Home > About the Journal > Journal of Civil Engineering, JKUAT: Journal Sponsorship. Log in or Register to get access to full text downloads.

  13. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  14. Features of upbringing children in civil law

    OpenAIRE

    Лобжанідзе, Давид

    2014-01-01

    The paper analyzes the features of upbringing children in civil law, in particular under the Civil Code of Georgia. The author examines the concept of the family as a social phenomenon and its underlying principles. Attention is paid also to the court practice of upbringing children and determining the place of their residence. English abstract D. Lobzhanidze Features of upbringing children in civil law. The paper analyzes the features of upbringing children in civil law, in particular u...

  15. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz

    2015-01-01

    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  16. 50 CFR 300.40 - Civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil penalties. 300.40 Section 300.40... South Pacific Tuna Fisheries § 300.40 Civil penalties. The procedures of 15 CFR part 904 apply to the assessment of civil penalties, except as modified by the requirements of section 8 of the Act. ...

  17. 49 CFR 233.11 - Civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalties. 233.11 Section 233.11..., DEPARTMENT OF TRANSPORTATION SIGNAL SYSTEMS REPORTING REQUIREMENTS § 233.11 Civil penalties. Any person (an... subject to a civil penalty of at least $650 and not more than $25,000 per violation, except that...

  18. 7 CFR 1435.201 - Civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Civil penalties. 1435.201 Section 1435.201... Recordkeeping Requirements § 1435.201 Civil penalties. (a) Any processor, refiner, or importer of sugar, syrup... false data required under § 1435.200(a) through (e), is subject to a civil penalty of no more than $10...

  19. 12 CFR 215.11 - Civil penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Civil penalties. 215.11 Section 215.11 Banks... OFFICERS, DIRECTORS, AND PRINCIPAL SHAREHOLDERS OF MEMBER BANKS (REGULATION O) § 215.11 Civil penalties... subject to civil penalties as specified in section 29 of the Federal Reserve Act (12 U.S.C. 504). [Reg. O...

  20. 39 CFR 233.12 - Civil penalties.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Civil penalties. 233.12 Section 233.12 Postal... Civil penalties. False representation and lottery orders— (a) Issuance. Pursuant to 39 U.S.C. 3005, the... be liable to the United States for a civil penalty in an amount not to exceed $11,000 for each day...

  1. 12 CFR 229.21 - Civil liability.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Civil liability. 229.21 Section 229.21 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM... Availability Policies § 229.21 Civil liability. (a) Civil liability. A bank that fails to comply with any...

  2. 14 CFR 1212.800 - Civil remedies.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil remedies. 1212.800 Section 1212.800... Comply With Requirements of This Part § 1212.800 Civil remedies. Failure to comply with the requirements of the Privacy Act and this part could subject NASA to civil suit under the provisions of 5 U.S.C...

  3. 49 CFR 221.7 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 221.7 Section 221.7 Transportation... TRANSPORTATION REAR END MARKING DEVICE-PASSENGER, COMMUTER AND FREIGHT TRAINS General § 221.7 Civil penalty. Any... requirement is subject to a civil penalty of at least $650 and not more than $25,000 per violation, except...

  4. 38 CFR 21.7310 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Civil rights. 21.7310... Bill-Active Duty) Administrative § 21.7310 Civil rights. (a) Delegation of authority concerning Federal... her jurisdiction. See part 18 of this chapter. These equal opportunity laws are: (1) Title VI, Civil...

  5. 13 CFR 302.20 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Civil rights. 302.20 Section 302... TERMS AND CONDITIONS FOR INVESTMENT ASSISTANCE § 302.20 Civil rights. (a) Discrimination is prohibited... 601 of Title VI of the Civil Rights Act of 1964, as amended (42 U.S.C. 2000d et seq.) (proscribing...

  6. 7 CFR 761.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Civil rights. 761.3 Section 761.3 Agriculture... SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION General Provisions § 761.3 Civil rights. Part 15d of this title contains applicable regulations pertaining to civil rights and filing of discrimination complaints...

  7. 30 CFR 880.16 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 880.16 Section 880.16 Mineral... LAND RECLAMATION MINE FIRE CONTROL § 880.16 Civil rights. State and local authorities shall comply with Title VI of the Civil Rights Act of 1964 (Pub. L. 88-352) and all requirements imposed by or pursuant to...

  8. 31 CFR 103.57 - Civil penalty.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil penalty. 103.57 Section 103.57... REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.57 Civil penalty. (a) For any... willfully participates in the violation, a civil penalty not to exceed $1,000. (b) For any willful violation...

  9. 49 CFR 235.9 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 235.9 Section 235.9 Transportation... SIGNAL SYSTEM OR RELIEF FROM THE REQUIREMENTS OF PART 236 § 235.9 Civil penalty. Any person (an entity of... violates any requirement of this part or causes the violation of any such requirement is subject to a civil...

  10. 30 CFR 881.12 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 881.12 Section 881.12 Mineral... LAND RECLAMATION SUBSIDENCE AND STRIP MINE REHABILITATION, APPALACHIA § 881.12 Civil rights. State or local authorities shall comply with Title VI of the Civil Rights Act of 1964 (Pub. L. 88-352) and all...

  11. 7 CFR 3560.2 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3560.2 Section 3560.2 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS General Provisions and Definitions § 3560.2 Civil rights. (a... prohibition under Title VI of the Civil Rights Act of 1964, 42 U.S.C. 2000d and Title VI regulations against...

  12. 76 FR 71431 - Civil Penalty Calculation Methodology

    Science.gov (United States)

    2011-11-17

    ... DEPARTMENT OF TRANSPORTATION Federal Motor Carrier Safety Administration Civil Penalty Calculation... is currently evaluating its civil penalty methodology. Part of this evaluation includes a forthcoming... civil penalties. UFA takes into account the statutory penalty factors under 49 U.S.C. 521(b)(2)(D). The...

  13. 7 CFR 3550.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3550.3 Section 3550.3 Agriculture... DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS General § 3550.3 Civil rights. RHS will administer its... amended by Executive Order 12259, as applicable. The civil rights compliance requirements for RHS are in 7...

  14. 28 CFR 33.52 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Civil rights. 33.52 Section 33.52... Block Grants Additional Requirements § 33.52 Civil rights. The Justice Assistance Act provides that “no... the provisions of title VI of the Civil Rights Act of 1964; section 504 of the Rehabilitation Act of...

  15. 22 CFR 127.10 - Civil penalty.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil penalty. 127.10 Section 127.10 Foreign... Civil penalty. (a) The Assistant Secretary of State for Political-Military Affairs is authorized to impose a civil penalty in an amount not to exceed that authorized by 22 U.S.C. 2778, 2779a and 2780 for...

  16. 34 CFR 303.424 - Civil action.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Civil action. 303.424 Section 303.424 Education... Civil action. Any party aggrieved by the findings and decision regarding an administrative complaint has the right to bring a civil action in State or Federal court under section 639(a)(1) of the Act...

  17. 34 CFR 300.516 - Civil action.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Civil action. 300.516 Section 300.516 Education... DISABILITIES Procedural Safeguards Due Process Procedures for Parents and Children § 300.516 Civil action. (a... aggrieved by the findings and decision under § 300.514(b), has the right to bring a civil action with...

  18. 7 CFR 250.21 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Civil rights. 250.21 Section 250.21 Agriculture... TERRITORIES AND POSSESSIONS AND AREAS UNDER ITS JURISDICTION General Operating Provisions § 250.21 Civil... Department's nondiscrimination regulations (7 CFR parts 15, 15a, and 15b) and the FNS civil rights...

  19. 33 CFR 401.102 - Civil penalty.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Civil penalty. 401.102 Section... TRANSPORTATION SEAWAY REGULATIONS AND RULES Penalties-Violations of Seaway Regulations § 401.102 Civil penalty. (a) A person, as described in § 401.101(b), who violates a regulation is liable to a civil penalty of...

  20. 50 CFR 82.20 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Civil rights. 82.20 Section 82.20 Wildlife... (MARINE MAMMAL PROTECTION ACT OF 1972) Administration § 82.20 Civil rights. Each cooperative agreement... Civil Rights Act of 1964, 42 U.S.C. 2000d-2000d-4, and with the Secretary's regulations promulgated...

  1. 7 CFR 1709.18 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Civil rights. 1709.18 Section 1709.18 Agriculture... ASSISTANCE TO HIGH ENERGY COST COMMUNITIES General Requirements § 1709.18 Civil rights. This program will be administered in accordance with applicable Federal Civil Rights Law. All grants made under this subpart are...

  2. 49 CFR 228.21 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 228.21 Section 228.21..., DEPARTMENT OF TRANSPORTATION HOURS OF SERVICE OF RAILROAD EMPLOYEES Records and Reporting § 228.21 Civil... requirement is subject to a civil penalty of at least $650 and not more than $25,000 per violation, except...

  3. 49 CFR 218.9 - Civil penalty.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Civil penalty. 218.9 Section 218.9 Transportation... TRANSPORTATION RAILROAD OPERATING PRACTICES General § 218.9 Civil penalty. Any person (an entity of any type... requirement of this part or causes the violation of any such requirement is subject to a civil penalty of at...

  4. 28 CFR 65.52 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Civil rights. 65.52 Section 65.52... Additional Requirements § 65.52 Civil rights. The Act provides that “no person in any state shall on the... funds under the Act are also subject to the provisions of title VI of the Civil Rights Act of 1964...

  5. 50 CFR 401.22 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil rights. 401.22 Section 401.22..., DEVELOPMENT AND ENHANCEMENT § 401.22 Civil rights. Each application for Federal assistance, grant-in-aid award... Assisted Programs of the Civil Rights Act of 1964 and with the Secretary's regulations promulgated...

  6. 78 FR 672 - Civil Monetary Penalties

    Science.gov (United States)

    2013-01-04

    ... Part 3560 RIN 0575AC93 Civil Monetary Penalties AGENCY: Rural Housing Service, USDA. ACTION: Proposed rule. SUMMARY: The Rural Housing Service (RHS or Agency) proposes to implement two civil monetary... civil monetary penalties under the authority of 42 U.S.C. 1490s (section 543 of the Housing Act of 1949...

  7. 10 CFR 110.64 - Civil penalty.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Civil penalty. 110.64 Section 110.64 Energy NUCLEAR... Enforcement § 110.64 Civil penalty. (a) In response to a violation, the Commission may institute a proceeding to impose a civil penalty under section 234 of the Atomic Energy Act by issuing a notice to the...

  8. 10 CFR 1017.29 - Civil penalty.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Civil penalty. 1017.29 Section 1017.29 Energy DEPARTMENT... INFORMATION Violations § 1017.29 Civil penalty. Link to an amendment published at 74 FR 66033, Dec. 14, 2009... subject to a civil penalty under this part: (1) 10 CFR Part 1017—Identification and Protection of...

  9. History of Civil Engineering Modal Analysis

    DEFF Research Database (Denmark)

    Brincker, Rune

    2008-01-01

    techniques are available for civil engineering modal analysis. The testing of civil structures defers from the traditional modal testing in the sense, that very often it is difficult, or sometimes impossible, to artificially excite a large civil engineering structure. Also, many times, even though...

  10. Grid to supersede internet

    CERN Multimedia

    Goodard, A

    2000-01-01

    British scientists are developing a successor to the internet that will not only give researchers access to information but also raw computing power via seamless connections to the rest of the world (1 page).

  11. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  12. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  13. Internet research in psychology.

    Science.gov (United States)

    Gosling, Samuel D; Mason, Winter

    2015-01-03

    Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.

  14. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-04-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained. 

  15. Countering Internet Extremism

    National Research Council Canada - National Science Library

    Thomas, Timothy L

    2009-01-01

    ... that. Extremists' use of the Internet has developed rapidly since the Chechen-Russian conflict. Now they are more creative, and more importantly, more persuasive in their methods to recruit members, gain financial support, and provide proof of success...

  16. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  17. Art and Civil Action : Cultural Organizations in the European Civil Domain

    NARCIS (Netherlands)

    Gielen, Pascal; Lijster, Thijs

    2017-01-01

    In this article, the place of new cultural organizationsin the civil domain is analysed. The authors describe a theoretical model that they call the ‘civil chain’, describing the different phases in which civil organizations develop themselves. The civil chain delivers analytic insights into the

  18. NETWORK CULTURE - INTEGRAL PART OF NEW VALUES OF CIVIL SOCIETY

    Directory of Open Access Journals (Sweden)

    Vyacheslav Vladimirovich Sukhanov

    2014-06-01

    Full Text Available New technologies not only improve working conditions or communication, they are also bringing new values to  the society. This article discusses the concept of «network culture», which is now perceived by society as an integral part of values that can only exist in a civil society. We can research ( find   this kind of society in modern time period in Russia. The article analyzes the meaning of communication, how to use it, development processes in network media.  Nowadays network culture and its influence on society are almost in all spheres of state and society, as well as changes in perception of information and content generation process. Development of the Internet and Internet technologies largely set the tone for  the development of popular culture and allows you to store or to influence the national culture. Internet press today is and example which shows us, how this kind of tool can be used to influence on citizens.DOI: http://dx.doi.org/10.12731/2218-7405-2014-3-6

  19. Ageing in civil engineering materials and structures

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Jean-Marc [SETEC TPI, Tour Gamma D 58, quai de la Rapee, 75583 Paris (France)

    2005-07-01

    SETEC TPI will address the 'Aging' topic of the Dijon Symposium by talking about: aging in civil engineering materials and structures, prevention of aging phenomena, in-operation monitoring of degradations related to aging and compensatory measures required to maintain a good safety level. Works as the Millau viaduct, the EdF skyscraper at La Defense - Paris, the renovation of the Grand Palais of Paris and special structures with Monaco's floating dam as well as the 'number 10' shaped gateway boat at Marseilles are illustrations for the issues discussed. The durability of civil engineering structures has become a major concern for designers. The Millau viaduct is designed for a service life of 120 years, and the Monaco dam for 100 years. Calculation rules have been evolving toward the incorporation of the concept of life cycle, for example, the Eurocodes 2 rules (reinforced concrete). The talk will expose the factors which are being taken into account to delay aging versus structure types. This part will be focused towards materials and corresponding regulations: - Reinforced concrete (coating of reinforcements, opening of cracks, choice of reinforcement types), BAEL and Eurocodes 2 rules; - Frame steel (protection, sacrificial anode), CM66 and Eurocodes 3 rules. New materials will also be mentioned: - Ultra high-performance fiber/concrete, with the example of CERACEM applied at Millau for the covering of the toll area barrier; - Titanium, which is starting to appear in the building trades, as for instance for the Beijing China Opera House shell. The second part of the talk will be devoted to a specific case namely, the 'number 10' shaped gateway bridge, a prestressed concrete structure immersed in the Port of Marseilles, which will be used to illustrate the aging phenomenon in a corrosive environment. We will focus on the types of inspection series performed by the Autonomous Port Authority of Marseilles to check the behavior of

  20. Learning Internet of Things

    CERN Document Server

    Waher, Peter

    2015-01-01

    If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

  1. Internet of things

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2015-01-01

    This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed

  2. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  3. Internet and computer crimes

    OpenAIRE

    Janýšková, Zuzana

    2010-01-01

    INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction to the basic problems of Internet and computer crime (furthermore also "cyber crime"), which is a type of crime that is still relatively new, but fast developing in a similar pace as the information technologies. The thesis contains seven substantial chapters. First chapter is an introduction of this thesis, which focuses on its structure and summary of the content. Second chapter presents the most ...

  4. Acne and the Internet.

    Science.gov (United States)

    Zeichner, Joshua A; Del Rosso, James Q

    2016-04-01

    The Internet provides both education and miseducation for acne patients. Although some sites provide disease background information and objective treatment guidance, support networks, and research findings, others may seem to be objective on the surface, but are in reality run by untrained, self-proclaimed experts or are promotional in nature. Providers must be aware of the potential benefits and pitfalls the Internet provides for those suffering with acne. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Disclosure on the Internet

    International Nuclear Information System (INIS)

    Kratz, M.P.J.

    1998-01-01

    The key issues surrounding regulatory enforcement of Internet disclosure in the petroleum industry were discussed under three headings, i.e. (1) content problems, such as intellectual property, trademarks, copyright, licence limitations, accuracy of promotional and other information; (2) disclosure problems, including web site information, employee disclosure, electronic mail, and third party disclosures; and (3) regulatory issues that range from the Internet as the vehicle for stock manipulation, to transnational aspects, lack of editorial oversight, and multi-jurisdictional enforcement issues

  6. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  7. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  8. Miradas francesas sobre la Guerra Civil

    Directory of Open Access Journals (Sweden)

    Jean-Marc DELAUNAY

    2015-03-01

    Full Text Available Como muestra el asunto hoy vigente —pero relativamente discreto— de la venta del edificio que abrigó el antiguo taller parisino donde Picasso hizo su Guernica (1937, la Guerra Civil española sigue siendo en Francia una referencia mayor de la historia contempóranea. Al ritmo de las conmemoraciones decenales de su estallido (1996/2006, se ha desarrollado una verdadera marea memorial nutrida tanto por la apertura de archivos escritos y audiovisuales como por la desinhibición de los nietos de exiliados condicionados durante tanto tiempo por la historia de la derrota de sus padres y abuelos. Animan el debate las tribulaciones de la vida política española actual, entre neofranquismo, republicanismo y nacionalismos centralistas y/o regionales. Por haber sido la unica vía de salida, Francia —metropolis y África del norte— se vio más involucrada que cualquier otro país al recibir la aplastante mayoría de los exiliados. Aunque los verdaderos especialistas en dicha guerra son poco numerosos, todo un mundillo se ha otorgado el derecho y la capacidad de escribir sobre ella como descendientes de exiliados o activistas políticos, sobre todo en el sur de Francia. Todos los medios se ven afectados: desde la literatura estrictamente histórica al internet. De las obras eruditas, de vulgarización —también para la juventud— a las memorias arrancadas al olvido; de las actas de los coloquios a los tebeos; de los álbumes fotográficos a los documentales (siempre pro republicanos. Al tiempo toda la producción histórica generalista o militar junta a los partidarios de una visión anticomunista, neutralista o manifestamente pro franquista. La Guerra Civil española, que había encontrado una Francia dividida, la reencuentra de nuevo como tal a pesar de todos los intentos de mediación científica.

  9. Internet Use among Retired Teachers

    Science.gov (United States)

    Demiray, Emine; Candemir, Özden

    2017-01-01

    Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…

  10. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  11. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  12. United States Air Force Civil Engineering Additive Manufacturing Applications: Tools and Jigs

    Science.gov (United States)

    2016-03-24

    Its Potential Impact on Biotechnology and the Chemical Sciences. Analytical Chemistry, Vol. 86, 3240-3253. Halterman, T. (2014, August 28). 3D...2015). 3D Printing Makes Explosive Headway at AFIT. Civil Engineer Magazine , 23(1), 34-35. Smiths Detection. (2015). LCD 3.2E Handheld CWA & TIC...the Fleet’ Program. National Defense Magazine . Tan, A. (2014, Summer). Advanced Ordnance Teaching Materials. The Journal of ERW and Mine Action, 39

  13. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  14. Global Internet Video Classroom: A Technology Supported Learner-Centered Classroom

    Science.gov (United States)

    Lawrence, Oliver

    2010-01-01

    The Global Internet Video Classroom (GIVC) Project connected Chicago Civil Rights activists of the 1960s with Cape Town Anti-Apartheid activists of the 1960s in a classroom setting where learners from Cape Town and Chicago engaged activists in conversations about their motivation, principles, and strategies. The project was launched in order to…

  15. Campaigning on the Internet: 2008 Presidential General Election Candidate Webpage

    OpenAIRE

    William L. Benoit; Mark Glant; Leslie Rill

    2016-01-01

    The Internet is becoming an increasingly important component of political campaigns. This study employed content analysis to apply Functional Theory and Issue Ownership Theory to Obama’s and McCain’s presidential candidate webpages in the 2008 campaign. Acclaims (92%) were more common than attacks (98%); defenses did not occur in this sample. Policy (82%) was addressed more than character (18%). When discussing policy, these candidates addressed future plans most frequently, followed by gener...

  16. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  17. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  18. Practical Guide to Civil Mediation

    CERN Document Server

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that the Département des Institutions of the Republic and Canton of Geneva and the Groupement suisse des Magistrats pour la médiation (GEMME) - Swiss Association of Magistrates for Mediation have published a multilingual Practical Guide to Civil Mediation (including English). In this context, the Swiss Mission has underlined the benefits of resorting to mediation, especially for the personnel of international organizations, and which the Secretary-General of the GEMME has summarised as follows: it is a private process not requiring the waiver of the parties' immunities; the confidentiality of the mediation process is guaranteed both by the mediator and the parties to it; the search for an amicable settlement does not need to be determined by reference to law (provided that public order is respected); the process is faster (2 to 3 sessions), less costly and more flexible than civil or arbitration procedures; in order to reinforce the agreeme...

  19. Practical Guide to Civil Mediation

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that the Département des Institutions of the Republic and Canton of Geneva and the Groupement suisse des Magistrats pour la médiation (GEMME) - Swiss Association of Magistrates for Mediation have published a multilingual Practical Guide to Civil Mediation (including English). In this context, the Swiss Mission has underlined the benefits of resorting to mediation, especially for the personnel of International Organizations, and which the Secretary-General of the GEMME has summarised as follows: it is a private process not requiring the waiver of the parties' immunities; the confidentiality of the mediation process is guaranteed both by the mediator and the parties to it; the search for an amicable settlement does not need to be determined by reference to law (provided that public order is respected); the process is faster (2 to 3 sessions), less costly and more flexible than civil or arbitration procedures; in order to reinforce the agreem...

  20. Geometric procedures for civil engineers

    CERN Document Server

    Tonias, Elias C

    2016-01-01

    This book provides a multitude of geometric constructions usually encountered in civil engineering and surveying practice.  A detailed geometric solution is provided to each construction as well as a step-by-step set of programming instructions for incorporation into a computing system. The volume is comprised of 12 chapters and appendices that may be grouped in three major parts: the first is intended for those who love geometry for its own sake and its evolution through the ages, in general, and, more specifically, with the introduction of the computer. The second section addresses geometric features used in the book and provides support procedures used by the constructions presented. The remaining chapters and the appendices contain the various constructions. The volume is ideal for engineering practitioners in civil and construction engineering and allied areas.

  1. Claims in civil engineering contracts

    CERN Document Server

    Speirs, N A

    1999-01-01

    This paper considers claims arising during civil engineering construction contracts. The meaning of the word 'claim' is considered and its possible implications for additional cost and time to completion. The conditions of the construction contract selected will influence the risk apportionment between contractor and client and the price offered by the contractor for the work. Competitive bidding constraints and profit margins in the construction industry, however, may also influence the price offered. This in turn can influence the likelihood of claims arising. The client from his point of view is concerned to complete the work within an agreed time and budget. The circumstances under which claims may arise are reviewed in relation to typical conditions of contract. These circumstances are then related to the CERN LHC civil works. Ways of avoiding claims, where this is possible, are considered. Finally, the means of evaluation of claims and their settlement are considered.

  2. Radiation exposure from civil aviation

    International Nuclear Information System (INIS)

    Schalch, D.

    1994-01-01

    The question as to whether civil air crews and frequent air passengers ought to be classified among the group of occupationally exposed persons has in principle been decided by the recommendations adopted by the ICRP, the competent bodies of the EU, and national authorities. Measurements for more information on the radiation fields involved are planned. The German Radiation Protection Office (BfS) recently published a statement on dose commitments, assuming a maximum annual dose of approx. 8 mSv in addition to the mean value already determined. Legal provisions, which ought to be adopted also on EU level since civil aviation is a transboundary traffic system, have yet to come. (orig./HP) [de

  3. Civil forensic psychiatry - Part 2: specific issues.

    Science.gov (United States)

    Samuels, Anthony H

    2018-06-01

    This paper describes the main areas of civil forensic psychiatry (FP) and the skills required by psychiatric experts. Some specific areas of civil FP are discussed, including tort law reform, reliability of psychiatric evidence, contentious psychiatric disorders, and the many domains of civil FP. Civil FP is an important sub-specialty component of forensic psychiatry that requires greater emphasis in the training and continuing education of psychiatrists. A process of accrediting psychiatrists as having competency in advanced civil FP may be of value.

  4. Civil disobedience, feminism and body

    Directory of Open Access Journals (Sweden)

    Rosalía Romero Pérez

    2015-12-01

    Full Text Available In this article, feminist civil disobedience is analysed as democracy’s daughter. As regards the analysis of different interpretations of natural rights, the path of the ownership of the own body is followed from Sufragism and its epoch until the global world. At the present time, the right to own your body is defended from opposite positions, such as Femen and Islamic Feminism.

  5. Artificial Intelligence in Civil Engineering

    OpenAIRE

    Lu, Pengzhen; Chen, Shengyong; Zheng, Yujun

    2012-01-01

    Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applicati...

  6. Civil Engineering & Design Standards Manual

    OpenAIRE

    Vänttinen, Eetu

    2014-01-01

    Civil Discipline Engineering department in Foster Wheeler Energia Oy takes care of the construction of foundation, steel frame, platforms, cladding/roofing, HVAC, elevator, hoist and central vacuum system of the boiler building. The goal of the thesis was to compile a design manual for the department to ease up the startup of the design of a new project and standardize the design. Main objective was to gather together all the existing guidelines, standards and directives regarding the des...

  7. The Aftermath of Civil War

    OpenAIRE

    Chen, Siyan; Loayza, Norman V.; Reynal-Querol, Marta

    2007-01-01

    Using an event-study methodology, the article analyzes the aftermath of civil war in a cross-section of countries. It focuses on cases where the end of conflict marks the beginning of relatively lasting peace. The analysis considers 41 countries involved in internal wars over the period 1960--2003. To provide a comprehensive evaluation of the aftermath of war, a range of social areas is considered: basic indicators of economic performance, health and education, political development, demograp...

  8. INADMISSIBLE EVIDENCE IN CIVIL PROCEDURE

    Directory of Open Access Journals (Sweden)

    Mihajlo Dika

    2016-01-01

    Full Text Available This paper examines the exclusion of specific means of evidence as instruments for determining the object of evidence, as well as the taking of evidence in the framework of the Croatian civil procedure law. The introduction lays the grounds for classifying and qualifying exclusion of evidence (general, special; absolute, relative; removable, irremovable; direct, indirect, after which greater attention is paid to the so called absolute and relative type; exclusionary evidence of the direct relative type pertaining to the establishing of facts, and evidence dismissals. With regard to the indirect relative type, the paper examines exclusionary evidence concerning the object of evidence. The remainder of the paper focuses on illegally obtained evidence, while outlining the constitutional, statutory, judicature and doctrinaire premises of bearing for such evidence. Subsequently, the question of evidence obtained in violation of the Constitutional guarantee of respect and legal protection of private and family life, dignity, reputation and honour, as well as evidence obtained by breach of the Constitutional guarantee of freedom and secrecy of correspondence and all other forms of communication, and in violation of the right to safety and privacy of personal data, are discussed too. In addition, the paper analyses the institutions of preclusion of evidence and the so called informative evidence. Concluding, the author points to a lacking regulation of inadmissible evidence within the Croatian civil procedure law, underlining the need to determine de lege ferenda legal requirements with a view to operationalizing inadmissible evidence within the Croatian civil procedure law.

  9. CIVIL JUSTICE IN SOUTH AFRICA

    Directory of Open Access Journals (Sweden)

    D. Van Loggerenberg

    2016-01-01

    Full Text Available The South African adversarial system of civil procedure in the High Court owes its origin to that of England. As with all civil procedural systems, the South African system is not stagnant. Its primary sources, namely Acts of Parliament and rules of court, are constantly amended in an attempt to meet the changing needs of society. Court delay and costinefficient procedural mechanisms, however, contribute to public dismay. The High Court, in the exercise of its inherent power to regulate its process, do so with the purpose of enhancing access to justice. The advantage of the system lies in the fact that it is not cast in stone but could, subject to the Constitution of the Republic of South Africa, 1996, be developed to make it more accessible to the public whilst protecting the public’s fundamental rights entrenched in the Constitution and, in this regard, particularly the right to afair trial embedded in sec. 34 of the Constitution. This contribution gives an overview of the system with reference to the court structure, the judiciary, the process in the High Court and its underlying principles, appeals, class actions and alternative civil dispute resolution mechanisms.

  10. RISK DEFINITION IN CIVIL UNMANNED AVIATION

    Directory of Open Access Journals (Sweden)

    Volodymyr Kharchenko

    2016-12-01

    Full Text Available Objective: The risks in unmanned civil aviation are considered as one of the most important. In the article is proved applicability of ensuring the flight safety of aircraft and considered the basic risks of manned civil aviation. Methods: Analyzed statistical data on aviation accidents, organized probabilities distribution of aviation accidents for manned and unmanned civil aviation to identify factors that influence the occurrence of emergency situations in manned and unmanned aviation. Results: We proposed typology of risk components in civil aviation and systematized methods and techniques to reduce risks. Over the analogies defined possible risks, their causes and remedies in civil unmanned aircraft. Weight coefficients distribution was justified between risk types for development of recommendations on risk management in unmanned civil aviation. Discussion: We found that the most probable risk in manned civil aviation is the human factor, organization of air traffic control, design flaws of unmanned aviation system as a whole, as well as maintenance of unmanned aviation system.

  11. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  12. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  13. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  14. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  15. The fallacy of "equal treatment" in Brazil's bill of rights for internet users A falácia da "igualdade de tratamento" na carta brasileira de direitos dos usuários da internet

    Directory of Open Access Journals (Sweden)

    J. Gregory Sidak

    2012-12-01

    Full Text Available The "Brazilian bill of rights for internet users," or "marco civil," has been under consideration at the brazilian congress since 2011. Marco civil's provisions for network neutrality have been particularly controversial. Proponents of network neutrality in Brazil advocate for the "equal treatment" of all data packets, including banning internet service providers from offering to content providers the option to purchase enhanced quality of service in the delivery of data packets. These network neutrality rules conflict with the other goals and principles of marco civil-particularly goals to promote internet access, to foster innovation, and to protect the constitutional right of freedom of speech and the free flow of information.A "carta Brasileira de direitos dos usuários da internet," ou "marco civil," tramita no congresso Brasileiro desde 2011. As disposições do marco civil relativas à neutralidade de rede são particularmente controversas. Os defensores da neutralidade de rede no Brasil advogam pela "igualdade de tratamento" de todos os pacotes de dados, inclusive proibindo que provedores de serviço de acesso à internet ofereçam aos provedores de conteúdo a opção de adquirir uma melhor qualidade de serviço na entrega de pacotes de dados. Essas disposições relativas à neutralidade de rede conflitam com outros objetivos e princípios do marco civil - especialmente os objetivos de promover o acesso à internet, promover a inovação, e garantir o direito constitucional de liberdade de expressão e informação.

  16. [Regulating the internet: a comparative analysis of Brazil, Chile, Spain, the US, and France].

    Science.gov (United States)

    Segurado, Rosemary; Lima, Carolina Silva Mandú de; Ameni, Cauê S

    2015-12-01

    Global governance is of key concern in the current debate over the workings of the world's computer network, and Brazil has played a notable role in this process, especially after approval of the Marco Civil da Internet (law 12.965, april 23, 2014), which defines Brazil's regulatory framework for the internet. Dubbed the internet bill of rights, this law sets out the principles, guarantees, rights, and duties of internet users and providers in Brazil. Based on the fundamental categories of net neutrality, internet users' right to privacy, and copyright discussions from the perspective of intellectual property, the article offers a comparative analysis of regulations in five countries: Brazil, Chile, Spain, the US, and France.

  17. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  18. PERAN INTERNATIONAL CIVIL AVIATION ORGANIZATION ATAS PENERBANGAN SIPIL KOMERSIAL INTERNASIONAL DIATAS WILAYAH KONFLIK (STUDI KASUS ATAS PENEMBAKAN PESAWAT MALAYSIA AIRLANES MH17 DI RUANG UDARA UKRAINA 2014)

    OpenAIRE

    Nopansyah, Jaka

    2015-01-01

    This research entitled"The role of the international civil aviation organization on international commercial civil aviation over the area of conflict" (A case study on Malaysia Airlines MH17 flight shooting in the air space of Eastern Ukraine in 2014) The research method used is Normative Research, Library Research at Atmajaya University Yogyakarta, And Internet Media. MH17 Malaysian plane crash in Ukraine 2014, All 298 people on board a Malaysia Airlines plane died after th...

  19. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  20. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  1. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  2. Which Air Force Civil Engineer Capabilities Can Complement USNORTHCOM’s Role in Defense Support to Civil Authorities (DSCA)?

    Science.gov (United States)

    2014-05-21

    PERSONNEL FROM STANDARD PRIME BEEF OR RED 4F9K4 PROVIDES FOLDED FIBERGLASS MATTING ( FFM ) FOR AIRFIELD DAMAGE REPAIR (ADR). PACKAGE CONSISTS OF THREE FFM ...SETS (54’ X 60’), ONE FFM SUPPORT TOOL KIT, UPPER BUSHINGS, ANCHOR BUSHINGS, ANCHOR BOLTS, AND TWO EA MC-7 AIR COMPRESSORS. EACH UTC WILL BE TASKED TO...OF 7 FOLDED FIBERGLASS MAT SETS (54 FT X 60 FT), 2 FFM SUPPORT TOOL KIT, UPPER BUSHINGS, ANCHOR BUSHINGS, ANCHOR BOLTS AND 4 X MC-7 AIR COMPRESSORS

  3. Civil Support: DOD Needs to Clarify Its Roles and Responsibilities for Defense Support of Civil Authorities during Cyber Incidents

    Science.gov (United States)

    2016-04-01

    Robert T. Stafford Disaster Relief and Emergency Assistance Act Contents This is a work of the U.S. government and is not subject to copyright...T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act), when state capabilities and resources are overwhelmed and the President...recognizes that the department plays a crucial role in supporting a national effort to confront cyber threats to critical infrastructure. House

  4. Internet Congestion Control System

    Directory of Open Access Journals (Sweden)

    Pranoto Rusmin

    2010-10-01

    Full Text Available Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion in the router, whereas the source will adapt the sending rate appropriate with the feedback. These mechanisms are not enough to solve internet congestion problem completely. Therefore, this paper will explain internet congestion causes, weakness, and congestion control technique that researchers have been developed. To describe congestion system mechanisms and responses, the system will be simulated by Matlab.

  5. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  6. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  7. Internet Performance to Africa

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, L

    2003-10-01

    We report the first results ever for real-time Internet performance to Africa using the PingER methodology. Multiple monitoring hosts were used to enable comparisons with performance from different parts of the world. From these preliminary measurements, we have found that Internet packet losses to some African sites in recent months range from very poor to bad (> 12%), some getting better, others are holding steady or getting worse. This, together with the average monthly Round Trip Times, imply end-to-end maximum TCP throughputs that are order of magnitudes different between countries in the region. Africa is shown to be far from the Internet performance in industrialized nations due to the poor infrastructure in place today. These monitoring efforts can provide valuable information to analyze the relative rates of future improvement and today they help us to quantify the digital divide and can provide quantitative information to policy makers.

  8. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  9. Internet resource pricing models

    CERN Document Server

    Xu, Ke; He, Huan

    2013-01-01

    This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P

  10. Interpretation of Internet technology

    DEFF Research Database (Denmark)

    Madsen, Charlotte Øland

    2001-01-01

    Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic...... processes leading to the use of internet marketing technologies and to investigate how these new technologies are interpreted into the organisation. Investigating the organisational socio-cognitive processes underlying the decision making processes will give further insight into the socio...

  11. Kids rules the internet

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm

    2006-01-01

    ?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....

  12. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  13. The Internet and Ethiopia's IP Law, Internet Governance and Legal ...

    African Journals Online (AJOL)

    KM_Yilma & HH_Abraha

    3 Ian Lloyd (2014), Information Technology Law, 7th Edition, Oxford ..... private sector, in the global Internet governance forums has indeed been quite .... Ethiopian government is completely absent from the global internet governance.

  14. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Directory of Open Access Journals (Sweden)

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  15. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  16. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  17. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  18. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  19. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  20. Civil rights reference of administrative procedures

    International Nuclear Information System (INIS)

    Held, J.

    1984-01-01

    The book deals with the constitutional obligations which substantive civil rights demand from administrative procedures. The Federal Constitutional Court distinguishes between protection of civil rights in, and by, administrative and judicial procedures. The author analyses the example of the decision of the Federal Constitutional Court concerning the atomic power plant of Muelheim-Kaerlich. In the licensing procedure pursuant to the Atomic Energy Act, the civil rights of persons concerned are guaranteed by the governmental obligation to its protection. (CW) [de