WorldWideScience

Sample records for internet civil defense

  1. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  2. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  3. Internet Civil Defense: Feasibility Study

    Science.gov (United States)

    2002-12-09

    performance metrics; adjust Execution accordingly Figure (11-5a) Activity Map to Implement ICD – Potential GHNet Team Role ExecutionPlanning Phase...management team GHNet Team Role : Figure (11-5b) 113 The ICD approach of creating an “end-to end solution” and a “backbone” for integrated Emergency

  4. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  5. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  6. 76 FR 2246 - Defense Support of Civil Authorities (DSCA)

    Science.gov (United States)

    2011-01-13

    ... made the existing guidance outdated and inconsistent with current law and the current organizational structure of the Department of Defense. This final rule will facilitate civil authorities' access to the... Activities, and all other organizational entities within the Department of Defense (hereafter referred to...

  7. Human biomonitoring in civil defense; Humanbiomonitoring im Bevoelkerungsschutz

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Michael; Schmiechen, Katharina [Universitaetsmedizin Goettingen (Germany). Arbeits-, Sozial- und Umweltmedizin

    2012-07-01

    The booklet on human biomonitoring (HBM) in civil defense covers the following issues within two sections: (1) general part: definition and importance of human biomonitoring; application in civil defense; practice in a CBRN (chemical, biological, radiation, nuclear) scenario; sampling following a CBRN assignment; HBM for antidote administration; peculiarities of sampling in case of biological agents; microbiological detection procedure; human biomonitoring of radioactive metal isotopes. (2) Special part: substance profiles; list of HBM laboratories; list of poison information centers; questionnaire for exposure assessment in case of dangerous substance accidents; agreement for human biomonitoring examination.

  8. United States Civil Military Relations: Defense Reform

    Science.gov (United States)

    2016-03-01

    358–421. 154 Lederman, Reorganizing the Joint Chiefs of Staff, 74. 155 Thomas L. McNaugher and Roger L. Sperry , “Improving Military Coordination...edited by Thomas C. Bruneau and Florina Cristiana Matei, 26–38. New York: Routledge Taylor and Francis, 2015. McNaugher, Thomas L. and Roger L... Sperry . “Improving Military Coordination: The Goldwater-Nichols Reorganization of the Department of Defense.” In Who Makes Public Policy: The

  9. Support Assistants for Fire Emergencies; Student Manual, Part A. Firefighting for Civil Defense Emergencies.

    Science.gov (United States)

    International Association of Fire Chiefs, New York, NY.

    A manual intended to help fire departments and Civil Defense organizations train people to support regular fire forces during a national emergency is presented. It contains 11 chapters: Introduction, Modern Weapons and Radioactive Fallout, Role of Fire Service in Civil Defense, Local Fire Department Organization, Role of Support Assistants in…

  10. 24 CFR 100.308 - Good faith defense against civil money damages.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Good faith defense against civil money damages. 100.308 Section 100.308 Housing and Urban Development Regulations Relating to Housing and... Good faith defense against civil money damages. (a) A person shall not be held personally liable...

  11. Governança na internet: um estudo sobre o Marco Civil brasileiro

    OpenAIRE

    Laura Vilela Rodrigues Rezende; Meyrielle Rodrigues de Lima

    2016-01-01

    El trabajo tiene como propósito realizar un estudio sobre la legislación que rige el uso de Internet en Brasil, en el Marco Civil de Internet (Ley 12.965/2014). Se trata de una investigación descriptiva, de naturaleza cua litativa, basada en recopilación bibliográfica y estudio comparativo. Se ex pone inicialmente un breve histórico de Internet en Brasil y su panorama actual. Luego, se presenta el concepto de gobernanza en Internet y los su cesos que marcaron ...

  12. Bordering the Civic Imaginary: Alienization, Fence Logic, and the Minuteman Civil Defense Corps

    Science.gov (United States)

    DeChaine, D. Robert

    2009-01-01

    Current figurations of the "immigration problem" in the United States challenge our understanding of the rhetoricity of contemporary bordering practices. The public discourse of the Minuteman Civil Defense Corps serves to chart the alienization of undocumented migrants and the enactment of alien abjection on the U.S.-Mexico border.…

  13. Governança na internet: um estudo sobre o Marco Civil brasileiro

    Directory of Open Access Journals (Sweden)

    Laura Vilela Rodrigues Rezende

    2016-01-01

    Full Text Available El trabajo tiene como propósito realizar un estudio sobre la legislación que rige el uso de Internet en Brasil, en el Marco Civil de Internet (Ley 12.965/2014. Se trata de una investigación descriptiva, de naturaleza cua litativa, basada en recopilación bibliográfica y estudio comparativo. Se ex pone inicialmente un breve histórico de Internet en Brasil y su panorama actual. Luego, se presenta el concepto de gobernanza en Internet y los su cesos que marcaron las discusiones acerca de esta temática. Se aborda el Marco Civil de Internet en Brasil, el histórico de su creación y los principios que lo rigen. Se concluye que es un importante instrumento oficial regla mentario para asegurar la libertad y los derechos del usuario. Su concep ción se fundamentó en la participación de la sociedad civil, lo que puede considerarse inédito en lo que se refiere a la creación de leyes reglamenta rias. Se considera que esta sea una ley sofisticada en cuanto a sus directri ces, lo que la vuelve una de las más progresistas del mundo. Pese a todo lo anterior, su trayectoria democrática de creación le otorga un carácter ge neralista y superficial.

  14. Neutralidade de Rede: o caso Comcast v. Netflix e o Marco Civil da Internet / Net Neutrality: Netflix vs. Comcast's Case and the Brazilian Internet Civil Mark

    Directory of Open Access Journals (Sweden)

    Maria Eduarda Cintra

    2015-10-01

    Full Text Available Purpose – The main goal of the article is to address how Brazil has progressed in favor of net neutrality. Comcast vs. Netflix case is used as an example to compare the actions took by the United States and Brazil concerning this theme. Methodology/approach/design – The text follows the problem-driven approach to infer some conclusions about the practices that has been adopted by the United States and Brazil. Findings – It has been verified that Brazil is on the vanguard of internet governance as far as net neutrality is concerned. Practical implications – The article can allow for a vast comprehension about net neutrality on par with the Brazilian Internet Civil Mark.

  15. Marco Civil da Internet: uma lei sem conteúdo normativo

    Directory of Open Access Journals (Sweden)

    Eduardo Tomasevicius Filho

    2016-04-01

    Full Text Available A Lei n.12.965, de 23 de abril de 2014, promulgou o denominado Marco Civil da Internet, com o intuito de estabelecer princípios, garantias, direitos e deveres para os usuários de internet no Brasil. Embora se tenha comemorado sua aprovação, por supostamente as demais normas jurídicas vigentes no Brasil - como a Constituição Federal, o Código Civil e o Código Penal - não terem aplicação nas relações sociais entabuladas pela internet, essa lei apresenta poucas inovações e muitas insuficiências e deficiências de cunho jurídico. Somando-se a esse fato a impossibilidade jurídica de regulação de uma rede mundial de computadores por meio de lei de um único país, os problemas gerados pela internet continuarão a afetar a privacidade, honra e imagem das pessoas, ao mesmo tempo em que conquistas, como a da neutralidade da rede, terão pouco impacto na vida das pessoas.

  16. Research on the Propagation Models and Defense Techniques of Internet Worms

    Institute of Scientific and Technical Information of China (English)

    Tian-Yun Huang

    2008-01-01

    Internet worm is harmful to network security, and it has become a research hotspot in recent years. A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper. We first give its strict definition and discuss the working mechanism. We then analyze and compare some repre sentative worm propagation models proposed in recent years, such as K-M model, two-factor model, worm-anti worm model (WAW), firewall-based model, quarantine based model and hybrid benign worm-based model, etc. Some typical defense techniques such as virtual honeypot, active worm prevention and agent-oriented worm defense, etc, are also discussed. The future direction of the worm defense system is pointed out.

  17. Neutralidade de Rede: O caso Comcast v. Netflix e o Marco Civil da Internet

    Directory of Open Access Journals (Sweden)

    Maria Eduarda Cintra

    2015-05-01

    Full Text Available Propósito – O artigo pretende fazer uma reflexão sobre como o Estado brasileiro avançou quanto à defesa do princípio da neutralidade de rede. Para essa análise, será utilizado o caso Comcast vs. Netflix como exemplo para comparar as ações do Estados Unidos e do Brasil sobre o tema. Metodologia/abordagem/design – O texto segue o método de abordagem de análise de problema para poder tirar conclusões sobre as práticas adotadas pelos Estados Unidos e pelo Brasil. Resultados – Foi constatado que o Brasil está na vanguarda sobre governança da internet, especialmente por zelar pela neutralidade de rede. Implicações práticas – O artigo serve para compreensão da discussão sobre neutralidade de rede e, especialmente, sobre o processo do Marco Civil da Internet no Brasil. Originalidade/relevância do texto – O artigo, ao fornecer uma perspectiva comparada entre o Estado americano e brasileiro, mostra como esse bem público, qual seja o da internet neutra e aberta, tem sido preservado.

  18. "A Is for Atom, B Is for Bomb": Civil Defense in American Public Education, 1948-1963.

    Science.gov (United States)

    Brown, JoAnne

    1988-01-01

    Discusses the development of civil defense education following World War II. Examines its effects on the public as atomic bomb drills became commonplace in schools which also served as fallout shelters. Concludes that inadequate portrayal of the horrors of nuclear war produced anger, fear, and disillusionment as the postwar generation matured.…

  19. The relationship between personality, defense styles, internet addiction disorder, and psychopathology in college students.

    Science.gov (United States)

    Floros, Georgios; Siomos, Konstantinos; Stogiannidou, Ariadni; Giouzepas, Ioannis; Garyfallos, Georgios

    2014-10-01

    The purpose of this study is to assess any underlying links between personality, defense styles, Internet addiction disorder (IAD), and psychopathology in a college student sample. This is a cross-sectional study of fourth-year Greek Medical students who responded in a comprehensive test battery, which included validated questionnaires on IAD, personality traits, patterns of psychological defense styles, and psychopathology symptoms. A path model that was tested using Partial Least Squares (PLS) methodology showed that the defense styles employed by the students and certain personality traits (Impulsivity, Sensation Seeking, Neuroticism/Anxiety, and Aggression-Hostility) contributed to the prediction of variability in IAD, with IAD in turn predicting variability in overt psychopathology.

  20. Challenges to evaluate the impact of the Internet: The case of the organizations of the Central American civil society

    Directory of Open Access Journals (Sweden)

    Kemly Camacho Jiménez

    2004-01-01

    Full Text Available This paper presents the main methodological and conceptual challenges when doing research on the impact of the Internet on civil society organizations in Central America. It also presents a summary of the nine most important findings. The main purpose of this research, undertaken since the end of 1999, is to assess how technology has transformed civil society organizations and their ability to fulfill their missions. This work is led by the Social Impact of ICTs Research Area in Fundación Acceso based in Costa Rica

  1. Contemporary Chinese Defense Industry Reforms and Civil–Military Integration in Three Key Organizations

    OpenAIRE

    Francis, Ed; PUSKA, Susan M.

    2010-01-01

    This brief highlights key points on three Chinese government and military organizations involved in managing defense science, technology, and industry: 1) the State Council’s State Administration for Science, Technology and Industry for National Defense (SASTIND); 2) the General Armament Department (GAD) of the People’s Liberation Army; and 3) the Ministry of Industry and Information Technology’s Civil–Military Integration Promotion Department (CMIPD). This brief calls attention to im...

  2. Debates políticos na internet: a perspectiva da conversação civil

    Directory of Open Access Journals (Sweden)

    Francisco Paulo Jamil Almeida Marques

    2006-05-01

    Full Text Available Este artigo examina teoricamente algumas das dimensões da interface entre democracia e novas tecnologias digitais de comunicação e informação. Começando por um reconhecimento do estado da arte acerca da categoria "esfera pública", a proposta é avaliar as possibilidades de estabelecimento de uma versão virtual deste espaço discursivo. Para isso, procura-se apresentar os discursos a favor e os discursos contrários a plausibilidade do conceito de esfera pública virtual. Tais argumentos servem para fundamentar a proposta aqui defendida de esfera pública virtual enquanto conversação civil, ou seja, os debates desenvolvidos em listas de discussão e fóruns on-line abertos a qualquer usuário atuam de modo mais eficaz como espaço destinado à formação complementar de opiniões do que como um espaço decisório por excelência. A forma democrática de governo tem, assim, nas redes telemáticas, um canal alternativo para fomentar a participação dos cidadãos.This article examines specific questions about democracy and digital technologies of communication. The paper begins presenting the notion of public sphere as a guide to evaluate the possibilities of a virtual version of this discursive space. Then, it discusses certain arguments offered by authors for and against the notion of virtual public sphere. Such arguments give the necessary background to develop the proposal of virtual public sphere neither as a genuine discursive space nor as a space that refuses the requisites of a normative public sphere. In other words, this paper defends that most of the discursive spaces found in the internet act in a more efficient way as places dedicated to what is called civic conversation. Most of the debates in lists and online forums serve as a way to improve the given and take of opinions. The conclusion considers that democracy has through the internet an alternative way to foster citizen's participation.

  3. Civil Support: DOD Needs to Clarify Its Roles and Responsibilities for Defense Support of Civil Authorities during Cyber Incidents

    Science.gov (United States)

    2016-04-01

    national and economic security are increasing in frequency, scale, sophistication, and severity of impact. DOD’s 2013 Strategy for Homeland...Cyber threats to U.S. national and economic security are increasing in frequency, scale, sophistication, and severity of impact.1 The Department of...30According to Joint Chiefs of Staff, Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms (Nov. 8, 2010

  4. Defensive medicine in general practice: recent trends and the impact of the Civil Liability Act 2002 (NSW).

    Science.gov (United States)

    Salem, Omar; Forster, Christine

    2009-10-01

    This article presents the results of a survey conducted among New South Wales medical practitioners to assess the extent to which the enactment of the Civil Liability Act 2002 (NSW) has reduced the practice of defensive medicine. The new legislation was intended in part to reduce the practice of defensive medicine, both "assurance-type" measures, such as performing additional tests to assure patients they have received all possible care, and "avoidance-type" measures, such as avoiding the treatment of patients who may be at a higher risk for adverse outcomes and therefore at higher risk for filing lawsuits. However, the results of the survey reveal that many medical practitioners in New South Wales remain unaware of the legal reforms and the consequent reduction in their legal liability and continue to practise defensive medicine. This article argues therefore that while the ultimate aim of reducing litigation has been achieved in New South Wales through the introduction of the Civil Liability Act, the underlying and arguably more important aim of providing medical practitioners with a more secure environment in which to practise their profession effectively has not been achieved. The apparent failure to disseminate the legal changes to the medical profession illustrates the limitations of law reform to effectively engender social change without the active use of educative and other implementation initiatives.

  5. A Review on Internet of Things for Defense and Public Safety.

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-10-05

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  6. A Review on Internet of Things for Defense and Public Safety

    Directory of Open Access Journals (Sweden)

    Paula Fraga-Lamas

    2016-10-01

    Full Text Available The Internet of Things (IoT is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  7. A Review on Internet of Things for Defense and Public Safety

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-01-01

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. PMID:27782052

  8. Trying to Learn Lessons for Response to Extreme Events: Paradigm Shifts Affecting Civil Defense in the Trinational Region of Southwestern Amazonia

    Science.gov (United States)

    Santos, G. L. P.

    2015-12-01

    The last ten years have seen several extreme climate events in southwestern Amazonia with historic impacts. The City of Rio Branco, Capital of Acre, Brazil´s westernmost State, suffered its seventh consecutive annual flooding and its worst in March 2015. The city of Tarauacá, also in Acre, registered 12 flooding events between November 2014 and April 2015. The most recent flood of the trinational Acre River in 2015 set historic records for flood stage and number of displaced persons in Cobija, the Capital of Pando, Bolivia. From February to April 2014, floods of the Madeira River disrupted the one highway between Acre and southern Brazil. Puerto Maldonado, the capital in Madre de Dios Region of Peru had its worst flood in 50 years during 2014. In 2005 and 2010, prolonged droughts combined with ignition sources resulted in tens to hundreds of thousands of hectares of fire-damaged rainforests in the Madre de Dios, Acre and Pando (MAP) Region. The Civil Defenses in these three contiguous political units faced several abrupt paradigm shifts that affected their responses: 1) The drought of 2005 showed dramatically that regional rainforests do burn; 2) The recent flooding history, particularly in 2012 and 2015, demolished the cultural icon of a nine-year recurrence interval; 3) What happens outside your territory can be devastating. The Madeira River flood impeded an estimated 200 million dollars from circulating in Acre; 4) The past can be a terrible guide. For Cobija and Rio Branco, the 2015 flood was on the order of a meter higher than any other. Many home dwellers did not evacuate in time because they used past floods as a guide; 5) A collapse in communication - cell phones, land lines, and Internet - can get worse. In 2012, such a collapse occurred in two border towns for 5 days, yet in 2015 it lasted more than 11 days. Research is needed to address how institutions linked to Civil Defense can shift paradigms in time to be more effective.

  9. Emergency Support Function 15: Communication Synchronization during Defense Support of Civil Authorities Operations

    Science.gov (United States)

    2015-06-12

    Civil Authorities (DSCA) operations. 15. SUBJECT TERMS Emergency Support Function 15, External Affairs, Communication Synchronization, Inter ...29 Inter -Organizational Collaboration Approach .......................................................... 30 Summary...ICA Inter -organizational Collaboration Approach ICS Incident Command Structure JIC Joint Information Center NEMA Nebraska Emergency Management

  10. 人防地下室楼盖选型%Selection on Civil Air Defense Basement Floor System

    Institute of Scientific and Technical Information of China (English)

    马东亚

    2015-01-01

    Through the selection and comprehensive analysis of civil air defense basement floor system, it can be found that the occupancy floor height, construction cost, concrete and steel bar cost of beam and slab of Girderless floor are less than those of other floor systems.Girderless floor has huge comprehensive benefits.%进行人防地下室楼盖选型,综合分析比较可以得到:无梁楼盖相对于其他形式楼盖占用层高最少,施工费用最低,梁和板混凝土和钢筋材料费最少,综合效益最好。

  11. Soviet Post-Strike Civil Defense Rescue, Damage-Limiting, Repair and Restoration Operations.

    Science.gov (United States)

    1982-08-01

    transportation accidents or acts of terrorism is recognized in all countries. The actual organization of forces and capabilities naturally varies from country to...V. G. Strekozov, Oboronnaya Rabota Mestnykh Sovetov (Defense Work of Local Soviets), (Moscow: Yuridicheskaya literatura , 1981), pp. 50-58. 4. M. N

  12. Congressionally-Direct Homeland Defense and Civil Support Threat Information Collection

    Science.gov (United States)

    2008-09-01

    PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) St. Mary’s University of San Antonio 1 Camino Santa Maria Street San Antonio, TX 78228-5433 8...law Start/End Dates: 10-12 October 2006 Location: University of Guadalajara at Ocotlan, Mexico Attendees: Jeffrey Addicott, Roberto Rosas ...the Ministry of Defense and the Legal Affairs Office of the French Embassy in Lima , Peru with the diplomatic chancellery as the diplomat’s personal

  13. Organizaciones de la sociedad civil y sus producciones en radio e Internet: fortaleciendo agendas para la democracia y los derechos humanos en Colombia

    OpenAIRE

    Catalina Montoya-Londoño

    2013-01-01

    El presente artículo recoge una investigación sobre diez experiencias significativas en Colombia de productos comunicativos en radio e Internet realizados por organizaciones de la sociedad civil en pro de la democracia y los derechos humanos. A través de la búsqueda documental y entrevistas se- miestructuradas individuales y grupales con algunos de los protagonistas de estos proyectos, el estudio explora sus objetivos, dinámicas, alcances y retos.

  14. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  15. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  16. Disputa política, neutralidade de rede e direitos dos usuários: A cobertura sobre a votação do Marco Civil da Internet

    Directory of Open Access Journals (Sweden)

    Camila Mont'Alverne

    2017-01-01

    the Marco Civil da Internet (a bill regulating Internet services. The goal is to study not only the newspapers’ opinions about the bill, but also their positions on issues beyond the Marco Civil involving conflicts between the government and the deputies of the coalition government. Adopting Robert Entman’s approach, the study proposes a content analysis of the framing of the debates. In all, seven frames were identified in the coverage of the debates: disagreements between the government and its allies; defense of Net neutrality; opposition to the bill; shortcomings of the bill; mobilization in favor of the bill; questions about the quality of service provided by telecom companies; and criticism of the existence of Brazilian data centers. In order to examine the editorials’ content, the frames were analyzed qualitatively, along with the actors and institutions referred to in the editorials. Analysis shows on the one hand that the coverage prioritized the conflicts between the president and the coalition, and on the other, that the arguments focused on the gaps in the bill and the defense of Net neutrality. The newspapers hold ambiguous positions on the Marco Civil—they both support the bill, and highlight the problems and interests which undermine the bill. With these editorials on the Marco Civil, the newspapers offer an interpretation to their readership, all the while trying to maintain the appearance of protectors of public interest and still defending their own interests as businesses producing online content. Ce travail essaie de comprendre comment les journaux O Estado de S. Paulo et Folha de S. Paulo ont dépeint, dans leurs éditoriaux, la controverse autour du vote sur le Marco Civil da Internet (une loi réglementant les services Internet à la Chambre des députés brésiliens. L’idée est de comprendre non seulement l’opinion des périodiques au sujet du projet de loi, mais aussi leurs positionnements dans un débat qui dépassait le cadre

  17. 地下室人防建筑设计要点探究%Explore the Design Points of Civil Air Defense Architectural of Basement

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    With the rapid development of the construction in-dustry, the function of basement has a strong comprehensiven-ess, in addition to air defense requirements, as wel as the need for normal use, such as parking, and equipment. In this article, the author gives a detailed and in-depth discussion of the rel-evant points of civil air defense architectural design of basem-ent.%  随着建筑行业的快速发展,地下室的功能有着较强的综合性。除了防空要求,还有平时使用的需要,如停车,设备等。本文就地下室人防建筑设计的相关要点进行了细致、深入的探讨。

  18. Comorbidity of psychiatric disorders with Internet addiction in a clinical sample: the effect of personality, defense style and psychopathology.

    Science.gov (United States)

    Floros, Georgios; Siomos, Konstantinos; Stogiannidou, Ariadni; Giouzepas, Ioannis; Garyfallos, Georgios

    2014-12-01

    This study aims to contribute to the understanding of underlying causes for the development of Internet Addiction Disorder (IAD) and assess comorbidity with other mental disorders through the analysis of data from a clinical sample of college students who presented for treatment of IAD. The clinical sample of our study has demonstrated a high percentage of comorbidity with Axis I and II disorders, while the temporal precedence of the establishment of those disorders cannot lead to specific conclusions. Half of the sample (25/50) presented with comorbidity of another Axis I disorder and 38% (19/50) with a concurrent Axis II personality disorder. The majority of Axis I disorders (51.85%) were reported before the onset of IAD, 33.3% after the onset while it was unclear in 14.81% of cases. The examination of a path model demonstrated that important contributions to the understanding of this disorder can be made through concepts from the neurobiological, trait personality paradigm, as well as from the psychodynamic defense style paradigm. Comorbid psychopathology can further exacerbate the presentation of IAD through a direct link, regardless of the underlying personality structure. The clinician treating IAD patients should complete a clinical evaluation for comorbid Axis I and II diagnoses since their presence may signify a more serious presentation.

  19. Assessment of Local, State and Federal Request Processes for Defense Support to Civil Authorities in the United States

    Science.gov (United States)

    2009-12-01

    Emergency Support Function, Military Logistics , Pre-scripted Mission Assignment, Defense Coordination Officer/ Element, USC Title 10/ 32 Forces...Telecommunications Management • Transportation Management It details the logistics functions that will be the focus of the military logistics capabilities

  20. Retention and Promotion of High-Quality Civil Service Workers in the Department of Defense Acquisition Workforce

    Science.gov (United States)

    2014-01-01

    quality, other factors that may deter- mine the performance rating include the methods used to monitor the worker’s output, the frequency with which...P. Sanders, and Constance Horner, Civil Service Reform: Building a Government That Works, Washington, D.C.: The Brookings Institution, 1996

  1. Contemporary Internet as a Means for Leveling Social Inequality in the Context of Relationships between Civil Society and the State

    Science.gov (United States)

    Pronchev, Gennadi B.; Monakhov, Danila N.; Kovalchuk, Valerii K.

    2016-01-01

    The topicality of the research depends on the existence of social inequality which emerges as various social groups of the civil society interact with the state. With regard to this, the paper aims to find out the relation between the current social stratification and the usage level of modern information and communication technologies by…

  2. Internet como herramienta de recuperación de la memoria de la Guerra Civil española

    Directory of Open Access Journals (Sweden)

    Laura Solanilla-Demestre

    2012-07-01

    Full Text Available The case of the movements of recovery of memory of the losers of the Spanish Civil War is atypical if compared with the dynamics generated in other situations. The delay between the moment of historical trauma and the establishment of a democratic state partly explains this singularity. In this article we analyze the agents involved and as the technological tools used to achieve the objectives.

  3. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. 2. ed.; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Derakshani, Nahid; Drobig, Matthias; Koenig, Mario; Mentfewitz, Joachim; Prast, Hartmut; Uelpenich, Gerhard; Vidmayer, Marc; Wilbert, Stefan; Wolf, Manfred

    2016-07-01

    The recommendations for sampling for prevention of hazards in civil defense (analytics of chemical, biological and radioactive contaminations) cover the following topics: Requirements for sampling, description of the materials (chemical, biological and radioactive contaminated materials), decontamination, sample transport and protocol documents.

  4. 32 CFR 855.13 - Civil fly-ins.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Civil fly-ins. 855.13 Section 855.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.13 Civil fly-ins. (a)...

  5. On the Mechanical and Electrical Design and Installation of Large-scale Civil Air Defense Project%论大型人防工程中的机电设计与安装

    Institute of Scientific and Technical Information of China (English)

    王赞辉

    2016-01-01

    在人防工程机电项目的设计与安装过程当中,所包含的施工项目种类十分繁多。同时伴随着我国整体经济水平的快速发展,城市化进程的不断推进,对于人防工程的建设要求与标准也越来越高。因而就人防工程的机电设计与安装工作也提出了更为严苛的要求标准,本文将基于大型人防工程的施工特点,紧紧围绕着实际工程施工情况来展开相关的机电设计与安装工作。%In the mechanical and electrical design and installation of civil air defense engineering, there are many kings of construction project. With the rapid development of China's overall economic level and the constant advance of the urbanization process, the construction requirements and standards for civil air defense projects are also getting higher and higher. Therefore, the more stringent requirements of the standard of mechanical and electrical design and installation work of civil air defense projects are put forward. Based on the construction characteristics of large civil air defense project, this paper will focus on the actual engineering construction to expand the relevant mechanical and electrical design and installation work.

  6. Soviet Civil Defense Agricultural Preparedness.

    Science.gov (United States)

    1985-06-01

    at the capital’s William Soler children’s hospital. "EGF is a substance with magnificent qualities that stimulate the cicatrization process , and its...resulted in an extremely expensive and complex process , particularly as concerns obtainment of the raw material, however odd that may seem. "We do not...EGF by a recombinant method in yeast. This process followed studies performed by Cuban researchers to define the structure of EGF. Once they knew the

  7. Analyse de la place des dispositifs de communication partagée sur Internet dans les processus d'émergence et de recomposition de la société civile pakistanaise

    OpenAIRE

    2013-01-01

    In this thesis, the first study of its kind, the role of internet specially that of social networking shared devices on web 2.0 is analyzed in the process of emergence of Public Sphere – the notion introduced by Habermas, and ultimately in the process of democratization of civil society in Pakistan. Lawyers’ Movement (March 2007 – March 2009) of Pakistan is selected to analyze this role as this successful movement for the rule of law in the country is solely responsible for a fundamental demo...

  8. 信息安全视角下人防面临的威胁分析%Analysis on the Civil Air Defense Threat under the Perspective of Information Security

    Institute of Scientific and Technical Information of China (English)

    平亮

    2015-01-01

    信息防护是人民防空安全防护的重要组成部分,涉及的内容广泛,是一项系统工程,包括物理层安全、系统层安全、网络层安全和管理层安全等.%Information protection is an important part of the civil air defense. It is a system engineering that involves extensively, generally includes the physical security, system security, network layer, application layer and security management, etc.

  9. Eliminating mental disability as a legal criterion in deprivation of liberty cases: The impact of the Convention on the Rights of Persons With Disabilities on the insanity defense, civil commitment, and competency law.

    Science.gov (United States)

    Slobogin, Christopher

    2015-01-01

    A number of laws that are associated with deprivations of liberty, including the insanity defense, civil commitment, guardianship of the person and numerous competency doctrines in the criminal context, require proof of mental disability as a predicate. The Convention on the Rights of Persons With Disabilities commands signatory states to eliminate that predicate. Summarizing principles set out in my book Minding Justice: Laws That Deprive People With Mental Disability of Life and Liberty, I explain how this seemingly radical stance can be implemented. Specifically, this article proposes adoption of an "integrationist defense" in the criminal context, an "undeterrability requirement" when the state seeks preventive detention outside of the criminal process, and a "basic rationality and self-regard test" for incompetency determinations. None of these proposals requires proof of a mental disorder as a predicate condition. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. 人防工程给排水施工质量监控的流程与内容及策略探讨%Study on the process,content and strategy of water supply and drainage quality monitoring about civil air defense project

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      文章分析了人防工程给排水施工质量监控工作流程、主要部位和要求,并就人防工程给排水施工质量监控要点和措施展开了具体研究。%This paper analyzes the process,main parts and requirements of water supply and drainage quality monitoring for civil air defense project,and studies the key point and measures to monitor quality of civil air defense project in detail.

  11. On Civility and Civilizations

    Institute of Scientific and Technical Information of China (English)

    DAVID GOSSET

    2010-01-01

    @@ At a time when misunderstand-ings between cultures run rampant, when walls of fear, prejudice and hatred divide the members of the human family, it is urgent to intensify the dialogue between civilizations. Under the new leadership of its Director General lrina Bokova, the United Nations Educational, Scientific and Cultural Organization (UNESCO) declared 2010 as the "Year for the Rapprochement of Cultures." In this context, the concerted reflections and actions of Europe and China can be highly meaningful.

  12. The Potential Linkage between Emergency Medical Services Systems and Health Systems Agencies to Civil Defense Related Health and Medical Care Plans and Operations.

    Science.gov (United States)

    1980-07-01

    Objective 10 B. Study Methodology 10 IV. E 7SS/HSA LINKAGE TO CIVIL DEFEN SE 13 V. HEALTH AND MEDICAL PLANNING FUNCIONS 31 A. Primarily Non-Health...Department Responsibilities 31 B. Primarily Health Department Responsibilities 41 VI. DISASTER MEDICAL PLANNING IN THE SAN FRANCISCO BAY AREA 62 VII...Agency B-i APPENDIX C - State Emergency Health Service Planning Functions: Potential Agency Input C-i APPENDIX D - San Francisco Bay Area Planning D

  13. Iranian English for Academic Purposes (EAP) Stakeholders' Attitudes toward Using the Internet in EAP Courses for Civil Engineering Students: Promises and Challenges

    Science.gov (United States)

    Atai, Mahmood Reza; Dashtestani, Reza

    2013-01-01

    English for academic purposes (EAP) has established itself as a considerable part of English as a foreign language (EFL) instruction in Iranian universities. Considering the Internet as a major educational source in EAP reading courses, it is highly important that the stakeholders have positive attitudes toward it and be aware of promises and…

  14. The Federal Civil Service Workforce: Assessing the Effects on Retention of Pay Freezes, Unpaid Furloughs, and Other Federal-Employee Compensation Changes in the Department of Defense

    Science.gov (United States)

    2014-01-01

    of the 2011–2013 pay freeze, the unpaid furloughs in 2013, a wave of retirements of the baby - boom generation, and recent proposals by lawmakers to...Department of Defense (DoD). These pay actions on top of a wave of baby -boomer retirements and various proposals by lawmakers to reduce federal compensation

  15. 第三人过错不应作为环境污染民事责任的抗辩事由%Fault of the Third Party should not Be the Civil Liability Defenses of Environmental Pollution

    Institute of Scientific and Technical Information of China (English)

    彭本利

    2012-01-01

    That this article first analyzes the fault of a third person is the defenses of the tort cases of fault liability. Then it comprehensively reviews the evolution of the fault of a third person's position in China's environmental legislation, and for theoretical arguments about whether the fault of a third party is the defenses in civil liability for environmental pollution. It proposed that in any subsequent revision of China "marine environmental protection law" and "water pollution control act," and even the development of specialized environmental tort liability act, we should clearly define the fault of a third person, which are not the defenses in all areas of environmental pollution, while we also need to set up the mechanism of investigating the civil liability for fault of a third party leading to the environmental pollution and set up a social relief mechanism.%本文分析了第三人过错是过错责任侵权案件的抗辩事由,全面梳理了第三人过错在我国环境立法中的地位演变,并就第三人过错是否为环境污染民事责任抗辩事由的理论争议进行了深入的述评。提出在以后修改《海洋环境保护法》及《水污染防治法》,甚至制定专门的环境侵权责任法时,除了明确规定在所有环境污染领域第三人过错都不是抗辩事由外,还需合理地设置第三人过错污染环境民事责任的追究机制和社会化救济机制。

  16. INTERNET COMO UN NUEVO MEDIO SOCIAL PARA LA COMUNICACIÓN Y LA PARTICIPACIÓN CIUDADANA/INTERNET LIKE A NEW SOCIAL WAY FOR COMMUNICATION AND CIVIL PARTICIPATION

    National Research Council Canada - National Science Library

    Cabezas, Norman Garrido

    2012-01-01

    ... para las comunicaciones y el desarrollo humano en general. A través de una investigación nos hemos ocupado en la búsqueda de experiencias sobre el uso de la red con objetivos más comunicativos y sociales encontrándonos con la participación ciudadana digital cuya base radica en la incorporación de Internet como principal medio para su desarrollo. Mediante ...

  17. INTERNET COMO UN NUEVO MEDIO SOCIAL PARA LA COMUNICACIÓN Y LA PARTICIPACIÓN CIUDADANA/INTERNET LIKE A NEW SOCIAL WAY FOR COMMUNICATION AND CIVIL PARTICIPATION

    National Research Council Canada - National Science Library

    Norman Garrido Cabezas

    2012-01-01

    ... para las comunicaciones y el desarrollo humano en general. A través de una investigación nos hemos ocupado en la búsqueda de experiencias sobre el uso de la red con objetivos más comunicativos y sociales encontrándonos con la participación ciudadana digital cuya base radica en la incorporación de Internet como principal medio para su desarrollo. Mediante un...

  18. Ambivalências éticas do Anonymous Brasil: discursos políticos sobre liberdade e o Marco Civil da Internet

    OpenAIRE

    Moraes, André de Nardi Senna

    2016-01-01

    O presente trabalho busca uma reflexão sobre a identidade moral do net-ativismo e do hacktivismo Anonymous no Brasil. Questiona-se como tal reflexão ilustra as disputas discursivas no âmbito de políticas na rede. A investigação propõe ilustrar as relações entre a ética hacker do Anonymous Brasil e suas posições políticas sobre liberdade na internet. Os Anonymous tratam-se de uma ideia, um coletivo, que se inspiram nos arquétipos da comunidade hacker para reivindicar certos ideais de direitos ...

  19. La utilización de los criterios civiles para determinar el momento del perfeccionamiento de los contratos de consumo a través de internet

    OpenAIRE

    Vargas Fernández, Lucía Alejandra

    2016-01-01

    Las ventajas y desventajas que surgieron tras la aparición del comercio y la contratación electrónicos respecto de distintas ópticas jurídicas han sido de nuestro interés desde nuestras primeras investigaciones. Para nosotros en los inicios de la proliferación del internet, éste se veía solo como un nuevo medio de comunicación, pero con el devenir de los años las personas en general se dieron cuenta que no podía observarse de modo unidisciplinario y la idea evolucionó a una rea...

  20. Research on the Strategy on Defense DOS/DDOS Attack on Internet%互联网防御DOS/DDOS攻击策略研究

    Institute of Scientific and Technical Information of China (English)

    王鹏

    2012-01-01

      It mainly presents the principle of DOS/DDOS attack and the variety, focuses on the strategies on defense DOS/DDOS attack. Combined with professional defense system, it discusses the construction of the defense architecture.%  主要介绍DOS/DDOS攻击的原理与种类,并着重介绍防御DOS/DDOS攻击的应对策略,并结合专业防御系统对构建专业防御体系进行了探讨。

  1. 俄罗斯国防工业军转民介评及启示%Reflections on Russia’s Experience of Diverting National Defense Technology into Civil Industry Use

    Institute of Scientific and Technical Information of China (English)

    杜颖; 章凯业

    2015-01-01

    With the end of cold war, race for economic development and technology has replaced military competition for weighing the strength of a country. Hence Russia strategically adopts measures to divert the national defense technology partially or wholly into civil industry use. Deifnitely, Russia achieved a lot by taking measures compatible with the situation in Russia and integrating military use with civil use. However, due to absence of a macro level map, sufifcient ifnancial support and corresponding legal regime, Russia has witnessed defeats and failures during the process. China shall learn from Russia while addressing corresponding issues.%冷战结束后,经济发展和科技竞赛取代军事竞争,成为各国实力较量的焦点,俄罗斯也分阶段采取策略,将国防工业转轨生产民用产品或军民两用产品。在立足本国实际、实施军民一体化战略方面,俄罗斯的经验是值得肯定的,也取得了一定的成效。但是,由于没有宏观规划,缺乏充足的资金支持以及配套的体系化法律制度保障,其教训也是惨痛的。这些经验和教训对我国处理相关问题的启示意义很大。

  2. Design Points of New Civil Air Defense Equipment in Subway Sections%地铁区间新型人防设备设计要点

    Institute of Scientific and Technical Information of China (English)

    郭士博; 徐胜

    2016-01-01

    经济合理地实现城市轨道交通设计中的人防功能是地铁设计的一个重要问题。为解决地铁区间刚性接触网不断开条件下的人防设防问题,设计出新型区间单扇防护密闭隔断门。新型设备同时有效地解决了线路曲线段、大坡段及大盾构区间施工段的人防设防问题。详细介绍了新型设备的机构设计原理、工作性能及既有难题的解决方案,对其与既有设备的改进处进行对比,得出了新型设备的优越性与应用范围。%How to realize the functions of air defense eco-nomically and rationaly is an important issue in subway de-sign.Airtight blast partition door is designed for rigid cate-nary subway system which can be used when the catenaries and rail track are not disconnected.This new equipment al-so effectively solves the problem of air defense fortification line curve segments,steep slopes and large segments in shield zone construction.In this paper,the new equipment design principles, performance and solutions to existing problems are introduced in detail.The improvement and application range of the new equipment are also described.

  3. The ARPANET and DARPA Internet.

    Science.gov (United States)

    Perry, Dennis G.; And Others

    1988-01-01

    Reviews the development and growth of the ARPANET, a wide-area packet switching network initiated by the U.S. Department of Defense in 1969. Evolution of the ARPANET into the DARPA (Advanced Research Projects Agency) Internet in the 1970s and current uses of the internet are discussed. (16 references) (MES)

  4. 网络推手的传播学批判与辩护%Criticism and Defense of Internet Marketers from the Perspective of Communication

    Institute of Scientific and Technical Information of China (English)

    燕道成

    2011-01-01

    网络推手的出现让很多网络红人和网络事件从偶然转变成为了必然。一方面,对免费的网络注意力所蕴藏的巨大商业利益的认知加快了网络推手的职业化和商业化;另一方面,不成熟的行业自律导致了网络话语暴力、恶意制造媒介假事件、媒介职业伦理缺失等一系列问题。实际上,网络推手本身并无善恶之分,但网络推手的实现方式却有好坏之别,关键在于媒介社会给出的是何种样式的设置。面对网络推手的发展趋势已然是一个不争的事实,着眼于网络推手隐患的化解,职业伦理与法制的规范、积极文化的引导与媒介素养的提升势在必行。%The emergence of internet marketers makes possible highly visible internet celebrities and events.On the one hand,the awareness of enormous commercial benefits brought about by free attention accelerates professionalization and commercialization of internet marketing;on the other hand,immature self-discipline often leads to a series of problems such as internet discourse violence,malicious fraudulency,absence of ethics of the media.In essence,internet marketing is neither virtuous nor evil,but the realizations of it are.The key lies in how the mass media prescribes regulations.With internet marketing as an established fact,it is necessary to prevent its risks,enact professional ethics and regulations,guide it and promote its overall quality.

  5. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  6. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  7. Sofrimento psíquico no trabalho e estratégias defensivas dos operários terceirizados da construção civil Psychic suffering at work and defensive strategies of outsourced worker at building constructions

    Directory of Open Access Journals (Sweden)

    Paloma Castro da Rocha Barros

    2003-06-01

    Full Text Available Este artigo investiga as estratégias defensivas contra o sofrimento utilizadas pelos trabalhadores terceirizados de uma construtora em Brasília, utilizando como referencial teórico-metodológico a Psicodinâmica do Trabalho. Realizam-se entrevistas coletivas semi-estruturadas com 20 trabalhadores, distribuídos em quatro grupos com cinco participantes cada um, submetidas à análise de conteúdo. Os resultados apontam que os trabalhadores encontram-se vulneráveis e inseguros diante do modelo de produção terceirizado, que negligencia seus direitos e exige alta produtividade. O sofrimento torna-se visível por meio de indicadores de mal-estar tais como desgaste físico e mental e falta de reconhecimento, que é enfrentado mediante estratégias de mediação defensivas de negação e controle. O pressuposto inicial de que o modelo de produção baseado nos princípios tayloristas e na acumulação flexível de capital, preponderante no setor da construção civil, potencializa o sofrimento no contexto de produção é, então, confirmado.This paper investigated defensive strategies to confront suffering used by outsourced workers of building constructions builders in Brasília, having as theoretic-methodological reference the Psychodynamics of Work. Semi structured collective interview were undertaken with 20 workers, distributed in four groups with five participants each one. The interview was submitted to content analysis. The results show the workers presenting vulnerability and insecurity to face outsourced production models that would disregard their rights and demand high productivity. The suffering becomes visible by mal-being symptoms indicated as physic and mental stress and lack of recognition, that is copping by negation and control as defensive mediation strategies. The results confirm the initial presuppositions that the production model based on Taylorist principles and flexible accumulation of capital, predominant at the

  8. Can the Internet cope with stress?

    CERN Document Server

    Lisewski, Andreas Martin

    2007-01-01

    When will the Internet become aware of itself? In this note the problem is approached by asking an alternative question: Can the Internet cope with stress? By extrapolating the psychological difference between coping and defense mechanisms a distributed software experiment is outlined which could reject the hypothesis that the Internet is not a conscious entity.

  9. The Research and Application of Security and Defense System in Regional Service Based on Internet%基于Internet的区域服务安全防御系统的研究与应用

    Institute of Scientific and Technical Information of China (English)

    肖犁

    2011-01-01

    Internet作为信息分享平台越来越受到人们的关注,并在人们的日常生活中占据了重要的一席之地,但是随之而来的安全问题也开始日益严重。如何在实现数据共享的同时保证隐私和信息的可靠性开始成为IT行业研究的对象。本文主要研究了区域网络的安全防御系统,并通过实例证明了安全防御系统的重要性。%Internet has gained more and more attention as an information shared platform,while has taken a great place in people’s daily life.Moreover,the ensuing security problems have begun to increasingly serious.How to achieve data sharing while ensuring privacy and the reliability of the information has become the studying object in IT occupation.This paper studies the regional network security defense system,and demonstrates the importance of security and defense systems by example.

  10. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens......In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  11. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  13. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  14. The Soviet Civil Defense Medical Preparedness Program.

    Science.gov (United States)

    1984-03-01

    emergency ambulance service staffed by physicians. In addition, there is a network of hygiene- epidemological stations with their own physicians. In the... Epidemological Stations (SES) at republic, oblast, and city levels and also at institutes of epidemiology, microbiology, and hygiene. The mission of these... epidemological control in host areas and in shelters. o Planning for and preparation of the evacuation of urban CDMS formations and health institutions, their

  15. Civil Defense in Soviet Strategic Perceptions.

    Science.gov (United States)

    1980-01-01

    of the textile industry was 62 percent of 1940, and of the food industry 42 percent. 2 6 Freight turnover on the railroad declined from 95 billion...for aid to Belorussia. The UNRRA aid consisted mainly of shipments of food (53 per- cent of the total value), clothing, textiles and footwear (some...Economy," Bolshevik, No. 6, March 1946, pp. 69-92. 63 Kosyachenko, p. 59. The gross industria -l output in terms of the 1940 level declined from 91 percent

  16. Civil Disobedience.

    Science.gov (United States)

    Martz, Carlton

    2000-01-01

    This theme issue looks at three historical and recent instances of civil disobedience. The first article examines the Free Speech Movement, which arose on the Berkeley campus of the University of California in the 1960s. The second article recounts the struggle of Mahatma Gandhi to free India from the British Empire. The final article explores the…

  17. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  18. Load Determination and Internal Force Calculation Methods for the Door-frame Wall in Civil Air Defense Basement Structures%人防地下室门框墙荷载取值和内力计算方法

    Institute of Scientific and Technical Information of China (English)

    陈星

    2014-01-01

    净高超过3.6 m 的五、六级人防地下室门框墙需要手算内力和配筋。对于最常见的无侧立柱型门框墙,可根据门框墙的组成部分将其分割成侧挡墙、门槛、上挡墙和上挡梁,按照单一构件确定其等效静荷载取值和计算方法。侧挡墙和门槛可按照规范提供的方法设计。现有文献对上挡墙的等效静荷载取值说法不一,可根据人防设计规范的要求,按照是否设置上挡梁,分别取临空墙荷载或门框墙荷载。上挡梁的计算跨度和边界条件,在不同文献中区别较大。在 SAP2000中采用壳单元和梁单元分别模拟人防墙板和上挡梁,结果显示上挡梁的支座条件很难达到理想的固结。由于门框墙的几何尺寸较为固定,层高和支撑墙的长度对上挡梁弯矩影响不大。分别调整上挡梁截面、支撑墙墙厚和梁跨度,无量纲化之后,发现墙梁抗弯刚度比同支座与跨中弯矩比之间呈对数关系,并对其进行了拟合。给出了无侧立柱型门框墙的手算流程,并同图集结果进行对比,结果显示本文提供的计算方法同人防图集的配筋值较为接近。%For the door-frame wall in civil air defense basement structures at five or six grade seismic intensity fortification zones, interior forces need to be hand-calculated if the clear height of basement is more than 3. 6 m. For most common door-frame walls without column flanks, the wall can be divided into several parts, including the flank retaining wall, the doorsill, the above-door retaining wall, and the above-door beam. These components can be designed by the equivalent static load method one by one. The flank retaining wall and the doorsill should be designed according to Code for Design of Civil Air Defense Basement. However, the equivalent static load values are different in existing literatures. It should be classified as the opening wall load or the door-frame wall load

  19. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  20. Coding and encoding rights in internet infrastructure

    Directory of Open Access Journals (Sweden)

    Stefania Milan

    2017-01-01

    Full Text Available This article explores bottom-up grassroots ordering in internet governance, investigating the efforts by a group of civil society actors to inscribe human rights in internet infrastructure, lobbying the Internet Corporation for Assigned Names and Numbers. Adopting a Science and Technology Studies (STS perspective, we approach this struggle as a site of contestation, and expose the sociotechnical imaginaries animating policy advocacy. Combining quantitative mailing-list analysis, participant observation and qualitative discourse analysis, the article observes civil society in action as it contributes to shape policy in the realm of institutional and infrastructure design.

  1. Internet Banking

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available Internet Banking (known also as online banking allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short and banking from anywhere where internet access is available. In most cases a web browser such as Internet Explorer or Mozilla Firefox is utilized and any normal internet connection is suitable. No special software or hardware is usually needed.

  2. Responsabilidade civil

    OpenAIRE

    Dalanhol, André

    2002-01-01

    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Engenharia de Produção. 1. INTRODUÇÃO - aborda o tema Responsabilidade Civil - Reparação do Dano Moral Ambiental, de forma sucinta, justificando sua aplicabilidade no direito brasileiro, discorrendo acerca de cada etapa do trabalho; 2. MEIO AMBIENTE - CONCEITO - proposta de um conceito mais amplo de meio ambiente, que melhor se coadune com a realidade atual, uma vez que os con...

  3. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  4. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  5. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  6. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  7. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  8. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  9. Internet marketing

    OpenAIRE

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  10. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  11. Internet Accounting

    NARCIS (Netherlands)

    Pras, Aiko; Beijnum, van Bert-Jan; Sprenkels, Ron; Párhonyi, Robert

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  12. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  13. Internet censorship in Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    2015-06-01

    Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.

  14. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  15. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  16. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  17. The Civil War in cyberspace today

    OpenAIRE

    Eiroa, Matilde

    2015-01-01

    The appeal of the Spanish Civil War in the online world is a phenomenon deserving of attention, as an event that took place more than 75 years ago which still arouses debate and the curiosity of many. It is surprising that the media world considers it “newsworthy” and that it has an important presence on the Internet — on blogs, websites, You Tube, and even social media platforms such as Facebook and Twitter. This article examines all mention of the Civil War in online media. We start from th...

  18. 32 CFR 537.17 - Scope for civil works claims of maritime nature.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Scope for civil works claims of maritime nature. 537.17 Section 537.17 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS... nature. Under the River and Harbors Act (33 U.S.C. 408), the United States has the right to recover fines...

  19. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  20. Internet Predictions

    OpenAIRE

    Estrin, Deborah; Chandy, K. Mani; Young, R. Michael; Smarr, Larry; Odlyzko, Andrew; Clark, David; Reding, Viviane; Ishida, Toru; Sharma, Sharad; Cerf, Vinton G.; Hölzle, Urs; Barroso, Luiz André; Mulligan, Geoff; Hooke, Adrian; Elliott, Chip

    2010-01-01

    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section.

  1. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  2. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  3. Geophylosophy of circumpolar civilization

    Directory of Open Access Journals (Sweden)

    I. A. Zhuvaka

    2014-09-01

    Under the influence of colonization occurred the interpenetration of civilizations, indigenous peoples have largely lose its image, the traditional way of life and culture. Arctic civilization has appeared in a crisis and facing the threat of extinction.

  4. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  5. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  6. Det civile samfund

    DEFF Research Database (Denmark)

    Henriksen, Lars Skov

    2014-01-01

    Kapitlet giver en oversigt over de vigtigste teoretiske forståelser af begrebet om det civile samfund. Desuden giver kapitlet en empirisk oversigt over foreninger og organisationer i det danske civilsamfund samt befolkningens civile engagement.......Kapitlet giver en oversigt over de vigtigste teoretiske forståelser af begrebet om det civile samfund. Desuden giver kapitlet en empirisk oversigt over foreninger og organisationer i det danske civilsamfund samt befolkningens civile engagement....

  7. Citizenship in civil society?

    NARCIS (Netherlands)

    Ossewaarde, Marinus R.R.

    2007-01-01

    This article seeks to provide a conceptual framework to complement and guide the empirical analysis of civil society. The core argument is that civil society must be understood, not as a category of (post)industrialized society, but as one of individualized society. Civil society is characterized by

  8. 32 CFR 537.15 - Statutory authority for maritime claims and claims involving civil works of a maritime nature.

    Science.gov (United States)

    2010-07-01

    ... claims involving civil works of a maritime nature. 537.15 Section 537.15 National Defense Department of....15 Statutory authority for maritime claims and claims involving civil works of a maritime nature. (a... affirmative claims involving civil works of a maritime nature is set out at 33 U.S.C. 408. ...

  9. Civil Society Organizations: Development and Failures

    OpenAIRE

    Abdallah, Ali Saleh

    2016-01-01

    One has not to be worried about civil society organizations because they have already received an important role to play in social activities, in the development and the defense of human rights. Therefore, they represent a key partner for the state, alongside with which they participate in economic and social development. In fact, nowadays, it is no longer possible for the state alone to vouch for social development and to assume responsibility for all social problems. The relations between t...

  10. INTERNET ETHICS

    OpenAIRE

    Laurentiu Fratila

    2008-01-01

    In our age, Internet is the biggest information network in the world; it consists of a set of heterogeneous networks from over 100 countries displaying huge amounts of virtual resources; it provides facilities such as email, file transmission protocol (ftp), workgroups discussion or chat, information and dissemination of information (www – world wide web). Internet has a major impact over all activity fields: political, social, economic and private life of users, as well. Newly developed, mod...

  11. Duties of care on the Internet

    NARCIS (Netherlands)

    van Eijk, N.; van Engers, T.; Wiersma, C.; Jasserand, C.; Abel, W.

    2011-01-01

    Internet Service Providers currently find themselves in the spotlight, both in a national and international context, with regard to their relationship both with governments and other private parties, on for example questions of (civil) liability. The paper focuses on duties of care as concerns the r

  12. Duties of care on the Internet

    NARCIS (Netherlands)

    van Eijk, N.; van Engers, T.; Wiersma, C.; Jasserand, C.; Abel, W.

    2011-01-01

    Internet Service Providers currently find themselves in the spotlight, both in a national and international context, with regard to their relationship both with governments and other private parties, on for example questions of (civil) liability. The paper focuses on duties of care as concerns the

  13. Reform and Development of Shanghai's Civil Affairs

    Institute of Scientific and Technical Information of China (English)

    LINGLING

    2005-01-01

    The work of the Shanghai Civil Affairs Bureau centers on social administration,democratic political construction at grass roots level, social relief and welfare,care and support of servicemen and their families, and national defense construction. It guarantees the people's basic rights, particularly those in difficulty,and maintains social stability. Effective management of civil affairs is crucial to the construction of a weft-off society.

  14. Construction of a teaching package on promoting prosocial internet use and preventing antisocial Internet use.

    Science.gov (United States)

    Ma, Hing Keung; Chu, Miranda K Y; Chan, Winnie W Y

    2011-01-01

    In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper.

  15. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper.

  16. 32 CFR Appendix A to Part 37 - What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment Agreements? A Appendix A to Part 37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS...

  17. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  18. Defying Predictions? Chilean Civil-Military Relations Since 1990

    Science.gov (United States)

    2010-06-01

    expression of roles and missions: the series of defense white papers ( Libros de la Defensa Nacional) that have been published by the Ministry of Defense...Robledo, "Chilean Civil-Military Relations," 112. 100 Libro de la Defensa Nacional de Chile, Quinta Parte, Ministerio de Defensa Nacional, 2002, available...the armed forces should behave in that context. A close look at the proclamations made in the past three editions of the libros de defensa reveals

  19. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  20. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  1. 32 CFR 700.822 - Delivery of personnel to civil authorities and service of subpoena or other process.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Delivery of personnel to civil authorities and service of subpoena or other process. 700.822 Section 700.822 National Defense Department of Defense... REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers in General § 700.822 Delivery...

  2. Civil Society and Governance

    DEFF Research Database (Denmark)

    Hulgård, Lars

    An illustration of how important the relationship is between civil society anbd governance. A short historic journey with four snapshots of times and situations that have provided interesting evidence about the connection between civil society and governance. My goal for the short historic journey...... is to make clear and hopefully even verify that providing knowledge about the impact of civil society and citizens’ participation on governance is one of the most urgent research tasks in the current period of time....

  3. Civil Society and Governance

    DEFF Research Database (Denmark)

    Hulgård, Lars

    An illustration of how important the relationship is between civil society anbd governance. A short historic journey with four snapshots of times and situations that have provided interesting evidence about the connection between civil society and governance. My goal for the short historic journey...... is to make clear and hopefully even verify that providing knowledge about the impact of civil society and citizens’ participation on governance is one of the most urgent research tasks in the current period of time....

  4. Legalisation of Civil Wars

    DEFF Research Database (Denmark)

    Buhl, Kenneth Øhlenschlæger

    2009-01-01

    -international armed conflict' is used here. Civil wars are usually limited to the territory of a state. Considering that international law is generally concerned with the legal relations between states – being a legal system based on the system of states with states as its subjects – the main question is how civil......This article is concerned with the legal challenges of regulating civil wars in international humanitarian law. Civil war is not a term used in international law; it falls however, withing the context of the legal term 'armed conflicts not of an international character', although the shorter 'non...... wars as internal conflicts have become subject to international humanitarian law....

  5. Reconceptualizing Civil Regulation

    DEFF Research Database (Denmark)

    Galang, Roberto Martin; Castello, Itziar

    2011-01-01

    This article re-conceptualizes the notion of civil regulation, through an analysis of 775 projects by firms located in 21 Asian countries, wherein we map the state of civil regulation initiatives in the region. We challenge two established assumptions in the Corporate Social Responsibility...... literature. First, contrary to what is commonly argued, we claim that strong states in Asia promote civil regulation in what we call the “paradox of the weak state”. Second, we not only argue that civil regulation is mainly enforced by multinational enterprises willing to promote international social...

  6. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  7. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  8. Internet India.

    Science.gov (United States)

    Pahl, Ronald H.

    1997-01-01

    Reviews a number of Internet sites containing information on every aspect of life in Modern India. The various sites provide information on such diverse topics as the Indian film industry, politics, the booming Indian computer industry, changing status of women, and financial and political issues. (MJP)

  9. The Impact of the Civil Rights Movement on the Women's Movement.

    Science.gov (United States)

    O'Connor, Karen

    1988-01-01

    States that the civil rights movements served as a catalyst to women in working for their own rights. Points out that the American Civil Liberties Union (ACLU) Women's Rights Project, modeled after the National Association for the Advancement of Colored People (NAACP) Legal Defense fund, led the litigation battles for women's rights. Lists…

  10. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective

  11. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mis

  12. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mis

  13. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  14. Charting the Course for Civil Affairs in the New Normal

    Science.gov (United States)

    2015-07-01

    0323. Cover Photography: U.S. Marine Corps Civil Affairs Staff Sgt. Alan O’Donnell hands out soccer balls to children at a medical civic action...the United States’ preference will likely be to respond expeditiously, using a minimal footprint approach. The 2012 Defense Strategic Guidance states

  15. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...

  16. Apps for Ancient Civilizations

    Science.gov (United States)

    Thompson, Stephanie

    2011-01-01

    This project incorporates technology and a historical emphasis on science drawn from ancient civilizations to promote a greater understanding of conceptual science. In the Apps for Ancient Civilizations project, students investigate an ancient culture to discover how people might have used science and math smartphone apps to make their lives…

  17. Refractions of Civil Society

    DEFF Research Database (Denmark)

    Kuzmanovic, Daniella

    The thesis investigates various perceptions of civil society among civic activists in Turkey, and how these perceptions are produced and shaped. The thesis is an anthropological contribution to studies of civil society in general, as well as to studies on political culture in Turkey....

  18. EUROPEIZAREA DREPTULUI PROCESUAL CIVIL

    Directory of Open Access Journals (Sweden)

    Alexandrina Zaharia

    2006-05-01

    Full Text Available The European Union increases the judiciary cooperation in civil and comercial cases with trans-border incidence, based on the principle of mutual recognition of judiciary rulings. The aim of adopting frame-legislation is to ensure the developement of civil procedures. The Council Regulations no. 44/2001 on the competence, the recognition and the enforcement of judiciary rulings in civil and commercial cases is a “real” Code of civil procedure in this matter, to be applied in the member states, thus ensuring the free circulation of the judiciary rulings according to the principles of mutual recognition, mutual trust and reinforcement of juridical security in the union. The community civil procedural code prevails over the national procedural code. The Regulations ensure the administration of the community justice and through their rules avoid the pronunciation, in the member states, of rulings that are irreconcilable with each other, the direct beneficiaries being legal and natural persons.

  19. Internet censorship.

    Science.gov (United States)

    1996-12-27

    The U.S. Supreme Court agreed to review a lower court ruling that found the Communications Decency Act to be an unconstitutional infringement on free speech. The judges from the U.S. District Court in Philadelphia said that parents should monitor material that children are exposed to on the Internet. AIDS groups that publish information on safer sex, HIV prevention and AIDS treatments are not responsible for censoring content.

  20. Internet Governance

    Directory of Open Access Journals (Sweden)

    Pedro Veiga

    2010-01-01

    Full Text Available It has now become quite obvious that the Internet has brought significant changes to our society and a break on how we lived before its emergence. It is still too early to assess the impact on society of the new services at our disposal, such as the capacity to communicate faster and cheaper on a global scale, access information and, perhaps more importantly, to produce and disseminate information in a way that is accessible to all.It is clear that the advent of the Information Society implies changes in our society that constitute a point of no return. However, contrary to what happened when we entered the Industrial Age about three centuries ago, when the changing process was slow and led by older individuals, these days the entrance into the Information Society is taking place rapidly and the decisive players are younger people. The global nature of the Internet, the possibility of producing and distributing any type of content in digital form at almost zero cost, as well as the vast number of people who use the web, have highlighted the need for new forms of intervention in a sector where there are many types of players. It is in this context that the problem of Internet Governance becomes a very current issue, inasmuch as one feels the need to guarantee a diversity of rights and duties, which may appear difficult to reconcile.This paper presents a brief overview of the main players and initiatives which, in the field of Internet Governance, have tried to contribute to turning this network into a factor for social development and democraticity on a global scale.

  1. The Civil War in cyberspace today

    Directory of Open Access Journals (Sweden)

    Matilde EIROA

    2015-03-01

    Full Text Available The appeal of the Spanish Civil War in the online world is a phenomenon deserving of attention, as an event that took place more than 75 years ago which still arouses debate and the curiosity of many. It is surprising that the media world considers it “newsworthy” and that it has an important presence on the Internet — on blogs, websites, You Tube, and even social media platforms such as Facebook and Twitter. This article examines all mention of the Civil War in online media. We start from the idea that the features of the online world allow for an extensive and multifaceted production of media of content which is more cultural, more social, and more attuned to the passing of time.

  2. Brazilian Foreign Policy Towards Internet Governance

    Directory of Open Access Journals (Sweden)

    Maurício Santoro

    Full Text Available Abstract Snowden´s whistleblowing on the NSA program had a powerful impact in Brazil, prompting Dilma Rousseff´s administration to promote, at the United Nations, resolutions on Internet privacy, freedom of expression, as well as to host important multistakeholder conferences and, domestically, to approve the innovative legislation known as Marco Civil. These answers were only possible due to a network of officials and activists. However, Brazil´s global leadership in Internet governance is fragile, with many internal contradictions.

  3. Climates, Landscapes, and Civilizations

    Science.gov (United States)

    Schultz, Colin

    2013-10-01

    Humans are now the dominant driver of global climate change. From ocean acidification to sea level rise, changes in precipitation patterns, and rising temperatures, global warming is presenting us with an uncertain future. However, this is not the first time human civilizations have faced a changing world. In the AGU monograph Climates, Landscapes, and Civilizations, editors Liviu Giosan, Dorian Q. Fuller, Kathleen Nicoll, Rowan K. Flad, and Peter C. Clift explore how some ancient peoples weathered the shifting storms while some faded away. In this interview, Eos speaks with Liviu Giosan about the decay of civilizations, ancient adaptation, and the surprisingly long history of humanity's effect on the Earth.

  4. Civil War and Inoperativity

    DEFF Research Database (Denmark)

    Flohr, Mikkel

    2017-01-01

    This article analyses the penultimate publication in Giorgio Agambens Homo Sacer-series Stasis: Civil War as a Political Paradigm. It compares and contrasts the paradigm of civil war with the preceding paradigm of the exception, and identifies a significant displacement in the relationship between...... of inoperativity towards a concept of destituent power drawing on his other writings. It makes the argument for thinking civil war and inoperativity – stasis and stasis – together to derive a concept of destituent power as a form of revolution against the sovereign state, which does not constitute a new sovereign...

  5. Producing Civil Society

    DEFF Research Database (Denmark)

    Feldt, Liv Egholm; Hein Jessen, Mathias

    Since the beginning of the 1990’s, civil society has attracted both scholarly and political interest as the ‘third sphere’ outside the state and the market not only a normatively privileged site of communication and ‘the public sphere’, but also as a resource for democratization processes...... of the century. 2, the laws and strategies of implementing regarding the regulation of civil societal institutions (folkeoplysningsloven) since the 1970’s this paper shows how civil society in 20th century Denmark was produced both conceptually and practically and how this entailed a specific vision and version...

  6. Vertical Evacuation Body in Deep Underground Public Space:Taking Qingdao Underground Civil Defense Engineering as an Example%垂直疏散体在超深地下公共空间的应用研究--以青岛某地下人防工程为例

    Institute of Scientific and Technical Information of China (English)

    胡望社; 李俊钊; 李自力; 崔远

    2015-01-01

    abstract The development and utilization of underground spaces are heavily limited by actual conditions and regulations for fire prevention. The depth of underground spaces, which is over 10 meters, cannot be applied to commercial development due to the problem of personnel emergency evacuation. This paper takes Qingdao underground civil air defense engineering as an example, in which the underground space is buried more than 10 meters depth, with contradiction between the need for crowd escape and high level of elevation difference. This example integrates elevator and stair evacuation, forming an evacuation complex, namely "body vertical evacuation". For the safety evacuation design of super deep underground space, it provides a new train of thought, and enriches the theory of safe evacuation design.%由于自然条件、防火规范的限制,深于10m的地下空间的开发利用面临一个技术瓶颈,即受限于人员应急疏散问题而无法进行商业开发。以青岛某地下人防工程为例,为了解决埋深大于10m的地下公共空间中逃生人数多与垂直高差大的矛盾,考虑将疏散电梯与楼梯整合,形成疏散综合体,即“垂直疏散体”,旨在从建筑设计层面为超深地下公共空间的安全疏散设计提供新的思路,丰富其安全疏散设计的理论。

  7. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  8. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  9. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  12. THE POETIC VECTOR OF CIVILIZATION

    Directory of Open Access Journals (Sweden)

    Mikhail Epstein

    2016-01-01

    Full Text Available The article regards poetry as the type of a world view that has profound effect on the social and technical development of civilization. Contrary to popular belief about the decline of poetry in the technological age, poetry, as the desire for imaginative comprehension and transformation of the world, remains the most powerful engine of civilization. There are new, non-linguistic forms of existence of poetry (outside of verses and books that are explored in the article: anthropoeia, biopoeia, kosmopoeia, noopoeia, sociopoeia, technopoeia… For example, the technique is no less metaphorical and symbolic than poetry is, but it embodies the energy of creation not in words, but in the poetically transfigured matter where each element is „playing” with nature, overcomes the force of gravity, the distances of time and space. Tehnopoeia as realized in aviation, rocketry, electronics, Internet, new means of communication, allows to see clearly the invisible, to hear the inaudible, to speak many languages. Technopoeia is the poetic aspect of technology as an activity that implements the creative aspirations of humans and the symbolic vision of the world. The article examines the „physics of poetry,” as it was understood by Surrealists, and shows that the poetic perception of things is not opposed to its utilitarian functions, but both can be harmoniously combined. Contemporatry science and technology aspire to implement a number of fundamental biopoetic and cosmopoetic metaphors: the universe — a computer, a planet — a living organism, the computer — the brain, the Internet — the nervous system, infectious viruses — computer and genes, the language of life — the process of writing… The metaphor becomes an integral part of the scientific outlook and the driving force behind the new discovery. Philology and poetics need to develop new methods of analysis of poetic phenomena as embodied not in verses, but in scientific thinking and

  13. Civil Surgeon Info

    Data.gov (United States)

    Department of Homeland Security — USCIS designates certain doctors (also known as civil surgeons) to perform the medical exam required for most Green Card applicants. This data set represents the...

  14. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  15. 高密度电阻率法探测地下人防巷道装置类型选择与异常识别%unit type ChoSen for hiGh denSity reSiStivity method uSed in deteCtion of underGround Civil Air defenSe workS And reCoGnition of AnomAly

    Institute of Scientific and Technical Information of China (English)

    郭厚军; 张国鸿

    2015-01-01

    Based on Wenner arrangement and tri-pole unit test over known underground civil air defense works, and analysis of anomalous features, this paper introduced the use of right unit type of high density resistivity method that tells difference in resistivity of underground media and how to recognize the anomalous marker correctly.%通过在已知在已揭露的地下人防巷道上方高密度电阻率法中温纳装置、三极装置的试验以及异常特征分析,说明利用地下介质的电阻率差异,采用高密度电阻率法探测地下人防巷道工作时,应选择好装置类型,且要正确地识别其异常标志。

  16. Transnationalising Civil Society?

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    The paper takes a transnational perspective on developing an analytical framework for understanding how transnationalism interacts with civil society and how immigrant organisations use transnational strategies to challenge the pre-given positions of immigrants within given integration- and citiz......The paper takes a transnational perspective on developing an analytical framework for understanding how transnationalism interacts with civil society and how immigrant organisations use transnational strategies to challenge the pre-given positions of immigrants within given integration...

  17. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  18. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  19. [Civil, criminal and ethical liability of medical doctors].

    Science.gov (United States)

    Udelsmann, Artur

    2002-01-01

    In the last years doctors have been the target of a growing number of civil, criminal law suits, as well as ethical procedures. Medicine is a widely targeted career, not only owing to its inherent risks, but also owing to a mistaken approach of the Judiciary Power about the obligations of medical doctors. Decisions of the Medical Board in ethical procedures have an impact in civil and criminal justice and therefore should be followed closely. The purpose of this review is to provide a wide view from a doctor-lawyer perspective of cases involving civil, criminal liability of anesthesiologists as well as ethical procedures against them, in an effort to make them comprehensible to doctors. After a brief historical introduction civil liability foundations and legal articles are examined. Responsibilities of doctors, hospitals and health insurance providers are discussed separately, as well as reparation mechanisms. Crimes possible to occur during medical practice and respective penalties are described; the direct relationship between crime and civil reparation is demonstrated. The administrative nature of ethical procedure is described, emphasizing that the legal character of its penalties often serve as grounds for civil and criminal justice decisions. Prevention is still the best medicine. Good medical practice and a good medical-patient relationship are still the best ways to minimize lawsuits and their repercussions. Doctors should have some knowledge of juridical mechanisms in lawsuits and ethical procedures, but should not take defense initiatives without prior consultation of an attorney. Civil, criminal and ethical liability of physicians.

  20. Should bioengineering graduates seek employment in the defense industry?

    Science.gov (United States)

    Johnson, Arthur T

    2014-01-01

    They say that the difference between a mechanical engineer and a civil engineer is that the mechanical engineer develops weapons whereas a civil engineer designs targets. The implication is that some engineers are involved with building peaceful infrastructure whereas others contribute to destruction. This brings to mind the question: what is the proper role for engineers in the creation of weapons and defenses against them? In particular, should engineers specializing in biology or medicine be involved in the defense industry? After all, bioengineers are supposed to be builders or healers rather than warriors or destroyers.

  1. History, structure, and function of the Internet.

    Science.gov (United States)

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  2. Defense Support to Civil Authorities: Surveying Institutional Challenges

    Science.gov (United States)

    2009-05-01

    31 Alane Kochems. Heritage Foundation: Military Support to Civilian Authorities: An Assessment of the Response to Hurricane...catastrophic disasters. 42 BIBLIOGRAPHY Books Brinkley , Douglas. The Great Deluge: Hurricane Katrina, New Orleans, and the Mississippi Gulf Coast...Firehouse Magazine Annual Run Survey 2007. Firehouse.com (accessed December 11,2008). Kochems, Alane . Heritage Foundation: Military Support to

  3. Some Ecological Contexts of Attitudes Concerning Issues of Civil Defense.

    Science.gov (United States)

    1983-03-01

    very different from this pattern: high population densities, essentially no farmers, high population growth with an important inmigration component...b) In areas of high inmigration (over 50 percent during the decade), the index has its high value of 60, while the low of 51.3 characterizes...counties in the next highest inmigration category (25 to 50 percent). (2) Several ratio indices exceed the factor value of 2 (hence, the anticipated

  4. Analysis of Effectiveness of Civil Defense Program Elements.

    Science.gov (United States)

    1980-06-01

    Ill’l nIll o1.25141.8 1111112 II 6N_ MICROCOPY RESOLUTION TEST CHART NATIONAL BUREAU OF SIANDARDS Iq( A projections of future threats and attack options...California Department of Economics Attn: Professor Jack Hirschleifer Los Angeles, California 90024 Center for Planning & Research, Inc. Attn: Mr. Richard K

  5. Selected Soviet Military Translations (Air Force and Civil Defense Materials),

    Science.gov (United States)

    2007-11-02

    suspension of bombs in an. airplane can bo causes for this negative plionomonon. Cross action of tho controls consists of tho fact -chat under certain...controlled manually. The effect of the place of suspension of bombs is shown when tho machine is put into a turn,, or when it is held in a turn, as...and Sergey Stopanonko have repeatedly won first prizes in city and republic competitions. ’ , A , Twenty-seven sports.drivers of scooters and

  6. Civil Resistance: An Essential Element of a Total Defense Strategy

    Science.gov (United States)

    2014-06-01

    assassination site to his burial plot.105 The unarmed resistance movement quickly gained momentum and paralyzed the state apparatus. “Also at this point...displayed communications 9. Leaflets, pamphlets, and books I 0. Newspapers and journals II . Records, radio, and television 12. Sky ’\\vTiting and earth... burial places Public Assemblies 47. Assemblies of protest or support 48. Protest meetings 49. Camouflaged meetings of protest 50. Teach-ins

  7. Military Base Closures and Affected Defense Department Civil Service Employees

    Science.gov (United States)

    2006-03-07

    employees adversely affected by BRAC. Outplacement subsidies could also be offered to other federal agencies to hire displaced DOD employees through...for its civilians, such as outplacement services, priority placement and separation incentives, will be available to employees under NSPS

  8. The Civil Defense Acquisition Workforce: Enhancing Recruitment Through Hiring Flexibilities

    Science.gov (United States)

    2016-11-22

    Congress can also issue DHAs in law , generally for a specific agency and/or purpose. 11 The rule of three requires agencies to hire one of the top...Executive Order 13562. 20 The Merit Systems Protection Board (MSPB) found that the FCIP violated veterans’ preference and public notice laws in...oversight/hiring-information/ hiring-authorities/; OPM, “Veterans Employment Initiative, Vet Guide,” at https://www.opm.gov/policy-data-oversight

  9. The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism

    Directory of Open Access Journals (Sweden)

    Murdoch Watney

    2007-06-01

    Full Text Available Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which results in an unjustifiable infringement of civil rights. Since countries worldwide are focusing attention on the control of information on the Internet, the debate in respect of state control and the consequences of state control is relevant on a global level as it impacts on all Internet-connected countries.

  10. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  11. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  12. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  13. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2010-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  14. Internet: um meio desmassificado

    OpenAIRE

    Sousa, Ivo Dias de

    2016-01-01

    Objetivos Identificar as diferentes fases de evolução da Internet. Perceber a Internet como um meio desmassificado. Entender o conceito de hipertexto e a sua evolução. Saber os diferentes tipos de utilização da Internet. Compreender as diferentes dimensões da presença na Internet. N/A

  15. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  16. Moving towards balance: a study into duties of care on the internet

    OpenAIRE

    van Eijk, N.A.N.M.; van Engers, T.M.; Wiersma, C.; Jasserand, C.A.; Abel, W.

    2010-01-01

    Commissioned by the WODC (Wetenschappelijk Onderzoeken Documentatiecentrum), research has been conducted on duties of care on the Internet, more specifically from the perspective of Internet service providers. Internet service providers currently find themselves in the spotlight, both in a national and international context, with regard to their relationship both with governments and other private parties, on for example questions of (civil) liability. This research focuses on duties of care ...

  17. Normes techniques, normes sociales, l'Internet sous contrôle chinois

    OpenAIRE

    2012-01-01

    International audience; Technical norms, social norms, the chinese internet under contrololivier arifon 1, * 1 : resic (resic)* : auteur correspondantWith internet, the Chinese's government is coherent with its global project for the country. Since 1995, it has recommended a use of internet for the society and developed several forms of control. actually, four registers co exists: a technical control, a legal regulation, human measures on civil society and, more complex, a Chinese entrepreneu...

  18. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  19. Is European Defense a Bridge too Far?

    Science.gov (United States)

    2006-03-08

    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  20. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  1. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  2. Creative Ventures: Ancient Civilizations.

    Science.gov (United States)

    Stark, Rebecca

    The open-ended activities in this book are designed to extend the imagination and creativity of students and encourage students to examine their feelings and values about historic eras. Civilizations addressed include ancient Egypt, Greece, Rome, Mayan, Stonehenge, and Mesopotamia. The activities focus upon the cognitive and affective pupil…

  3. History and Undergraduate Civilization.

    Science.gov (United States)

    Conroy, Peter

    1995-01-01

    It is argued that a traditional, historically-oriented course in 17th- and 18th-century French civilization continues to be an appropriate and effective approach for undergraduate French study, in preparation for later, more sophisticated cultural analysis. Four course components are discussed: class lectures; literary text selection; textbook…

  4. Re-thinking civil disobedience

    Directory of Open Access Journals (Sweden)

    Theresa Züger

    2013-11-01

    Full Text Available This article points out a struggle of today’s societies with the traditional concepts of civil disobedience and stresses the need for reevaluation of the concept of civil disobedience for policy making and public discourse. Starting with a minimal definition of civil disobedience, the article introduces Hannah Arendt’s approach for a legitimisation of civil disobedience and discusses her ideas for digital actions, which are increasingly framed as digital forms of civil disobedience. Addressing WikiLeaks as an example of digital civil disobedience, the author problematises the internal secrecy of WikiLeaks and the focus on Julian Assange as a single decision-maker. Both aspects challenge Arendt’s understanding of legitimate civil disobedience. Even though traditional criteria of civil disobedience need to be revisited in the digital age, organisations or disobedience actors might themselves in their actions be well-advised to comply with the principles they fight for.

  5. Civil partnerships five years on.

    Science.gov (United States)

    Ross, Helen; Gask, Karen; Berrington, Ann

    2011-01-01

    The Civil Partnership Act 2004, which came into force in December 2005 allowing same-sex couples in the UK to register their relationship for the first time, celebrated its fifth anniversary in December 2010. This article examines civil partnership in England and Wales, five years on from its introduction. The characteristics of those forming civil partnerships between 2005 and 2010 including age, sex and previous marital/civil partnership status are examined. These are then compared with the characteristics of those marrying over the same period. Further comparisons are also made between civil partnership dissolutions and divorce. The article presents estimates of the number of people currently in civil partnerships and children of civil partners. Finally the article examines attitudes towards same-sex and civil partner couples both in the UK and in other countries across Europe.

  6. Implementing Security for Active Networks in Internet

    Institute of Scientific and Technical Information of China (English)

    Tang Yin; Wang Weiran

    2003-01-01

    Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.

  7. 75 FR 81547 - Defense Support of Civilian Law Enforcement Agencies

    Science.gov (United States)

    2010-12-28

    ... of the Secretary 32 CFR Part 182 Defense Support of Civilian Law Enforcement Agencies AGENCY... civilian law enforcement efforts, including responses to civil disturbances. DATES: Comments must be... for assisting civilian law enforcement agencies, therefore, it is not expected that small entities...

  8. The Limitation of Western Civilization And the Revival of Oriental Civilization

    Institute of Scientific and Technical Information of China (English)

    Su; Hao

    2014-01-01

    <正>In the distribution of modem world civilizations,the Oriental civilization and Western civilization are the two major civilization systems.Western civilization is often represented by the Christian civilization in Europe and North America on both sides across the North Atlantic.Oriental civilization appears more diversified,among which the Chinese civilization,India civilization and Islamic civilization are the most influential

  9. Exploring Civilizations with 'Seven Wolves'

    Institute of Scientific and Technical Information of China (English)

    Yang Jie

    2007-01-01

    @@ Beijing - A farewell party for the CCTV (China Central Television) crew 'Road to Civilizations-Global Exploration Tour of World Major Civilizations' - the world's first TV series documenting the journey of exploring the 12 civilizations in the human world, was sponsored by Fujian Septwolves Industry Co., Ltd and held at the Beijing Landmark hotel on 16 January.

  10. Civility in Classes and Sports

    Science.gov (United States)

    Lumpkin, Angela

    2010-01-01

    Civility is a polite or courteous act, expression, or standard of conduct, including the display of respect and tolerance to everyone. Teaching and modeling civility in classes and with sport teams is essential so students and athletes can learn the importance of and demonstrate civility in their interactions with others. Teachers and coaches…

  11. Research on Ecological Civilization Evaluation Index System

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Ecological civilization, which refers to the harmonious development of man and the nature, has the connotation of the ecological material civilization, ecological consciousness civilization, ecological institutional civilization and ecological behavior civilization. The research on ecological civilization evaluation index system is important in that it can provide the guidance for the construction of ecological civilization, and besides it can improve public recognition of the importance of ecological civil...

  12. Insolvencias. Civil y societaria

    Directory of Open Access Journals (Sweden)

    Gustavo Bordes Leone

    2014-01-01

    Full Text Available El deudor civil que, para substraerse al pago de sus obligaciones, ocultara sus bienes, simulara enajenaciones o créditos, se trasladara al extranjero o se ocultare sin dejar persona que lo represente, o bienes a la vista en cantidad suficiente para responder al pago de sus deudas, será castigado con pena de tres meses de prisión a tres años de penitenciaría. La acción penal no podrá ser ejercitada sino a denuncia de parte, y sólo en el caso de que la insolvencia del deudor resulte comprobada por actos infructuosos de ejecución en la vía civil.Antecedentes históricas. La insolvencia fraudulenta. Insolvencia societaria fraudulenta: Análisis crítico.

  13. Civil Procedure In Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    , enforcement in Denmark of judgments pronounced by Danish or foreign courts, as well as arbitration in Danish and international arbitral cases, based on the extensive Danish arbitral reform 2005, taking the Uncitral pattern arbitration law as its model. The book is written parly based on traditional legal...... on the author's extensive personal experience as arbitrator in numerous Danish and international arbitral proceedings.......The book contains an up-to-date survey of Danish civil procedure after the profound Danish procedural reforms in 2007. It deals with questions concerning competence and function of Danish courts, commencement and preparation of civil cases, questions of evidence and burden of proof, international...

  14. Civil Engineering Dispute Resolution

    CERN Document Server

    Osborne, J

    2001-01-01

    Construction work on the civil engineering contract started at Point 5 in August 1998. The new surface buildings and underground structures are necessary to accommodate the CMS detector for the LHC Project. The principal underground works consist of two new shafts, two parallel caverns separated by a supporting pillar, and a number of small connection tunnels and service galleries. A dispute resolution procedure has been included in the contract, whereby a Panel of Adjudicators may be called upon to make a decision in the case of a difference or dispute between the parties. The aim of this paper is to present CERN's first experience of civil engineering Adjudication arising from problems encountered with the ground freezing technique employed to allow construction of two new shafts.

  15. Manifestations of advanced civilizations

    Science.gov (United States)

    Bracewell, R. N.

    A list of possible modes of detecting advanced civilizations elsewhere in the universe is provided, including EM Alfven, and gravity waves, matter transfer, and exotica such as tachyons, black hole tunneling, and telepathy. Further study is indicated for low frequency radio wave propagation, which may travel along magnetic fields to reach the earth while laser beams are not favored because of the power needed for transmitting quanta instead of waves. IR, X ray, and UV astronomy are noted to be suitable for detecting signals in those ranges, while Alfven wave communication will be best observed by probes outside the orbit of Jupiter, where local anomalies have less effect. Particle propagation communication is viewed as unlikely, except as a trace of an extinct civilization, but panspermia, which involves interstellar spreading of seeds and/or spores, receives serious attention, as does laser probe or pellet propulsion.

  16. Civil society sphericules

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2014-01-01

    This article explores the communicative practice of a Tanzanian NGO, Femina. Based on a tripartite model of engagement (Madianou, 2012) integrating speech, action and understanding, and drawing on fieldwork on the communication practices of Femina, I critically assess the forms of civic engagement...... movement and a media initiative. In the context of the growing literature on social networking sites and their affordances, dynamics and structures, the case of Femina illustrates how a civil society sphericule emerges within the dynamic co-evolution of new and old media platforms. The study is furthermore...... an example of the difficult shift in civil society practice, from service provision to an agenda of public service monitoring, social accountability and community engagement....

  17. [Civil status and suicide].

    Science.gov (United States)

    Gaxiola-Robles, Ramón; Bitzer-Quintero, Oscar Kurt; García-González, Adolfo; Celis-de la Rosa, Alfredo

    2009-01-01

    To determine if civil status acts as a risk factor in suicide and how it modifies according to gender, age and population size. A retrospective study which analyzes information from the mortality data from the National Institute of Statistics, Geography and Information, from 1998 to 2002. Variables like suicides age, sex, cause of death, federal entity, population size and civil status were registered. Single men showed twofold risk for committing suicide. Women did not show any associated risk for suicide according to civil status. The risk of married men for committing suicide increased gradually with age. Medium-sized communities with less than 19,999 habitants presented the highest risk for habitants to commit suicide. Suicide is associated to gender especially to men who are not married and living in small and medium-sized communities. One explanation could be the lack of integrated behavior as defined by Emile Durkheim, where the physical density of society will determine behavior and ideas. This social structure phenomenon is called the "moral cocoon." This works around the individual being less individualistic and granting him/her the feeling of belonging to a group.

  18. Insanity Defense: Past, Present, and Future.

    Science.gov (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney

    2015-01-01

    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  19. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  20. Internet and Internet Use: Teacher Trainees' Perspective

    Science.gov (United States)

    Akinoglu, Orhan

    2009-01-01

    The aim of this study is to present the development and issues of internet and internet use. The study has a descriptive survey design and 185 randomly selected teacher trainees at Marmara University, Ataturk Education Faculty in the 2001-2002 academic year constitute the sample. Data were collected via a questionnaire prepared by the researcher…

  1. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  2. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  3. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  4. 32 CFR 21.200 - What is the Defense Grant and Agreement Regulatory System (DGARS)?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What is the Defense Grant and Agreement... Washington Headquarters Services Internet site http://www.dtic.mil/whs/directives. Paper copies may be obtained, at cost, from the National Technical Information Service, 5285 Port Royal Road, Springfield,...

  5. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  6. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  7. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  8. Internet bad neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane César

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it occur

  9. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  10. GOOSE: semantic search on internet connected sensors

    Science.gov (United States)

    Schutte, Klamer; Bomhof, Freek; Burghouts, Gertjan; van Diggelen, Jurriaan; Hiemstra, Peter; van't Hof, Jaap; Kraaij, Wessel; Pasman, Huib; Smith, Arthur; Versloot, Corne; de Wit, Joost

    2013-05-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mission execution. Smart access to all sensor data acts as enabler for questions such as "Is there a person behind this building" or "Alert me when a vehicle approaches". The GOOSE concept has the ambition to provide the capability to search semantically for any relevant information within "all" (including imaging) sensor streams in the entire Internet of sensors. This is similar to the capability provided by presently available Internet search engines which enable the retrieval of information on "all" web pages on the Internet. In line with current Internet search engines any indexing services shall be utilized cross-domain. The two main challenge for GOOSE is the Semantic Gap and Scalability. The GOOSE architecture consists of five elements: (1) an online extraction of primitives on each sensor stream; (2) an indexing and search mechanism for these primitives; (3) a ontology based semantic matching module; (4) a top-down hypothesis verification mechanism and (5) a controlling man-machine interface. This paper reports on the initial GOOSE demonstrator, which consists of the MES multimedia analysis platform and the CORTEX action recognition module. It also provides an outlook into future GOOSE development.

  11. The Challenges of Defense Support of Civil Authorities and Homeland Defense in the Cyber Domain

    Science.gov (United States)

    2013-05-20

    Min Jiang, a professor at University of North Carolina, suggests that WCIT-12 “openly highlighted the conflict dubbed the “digital cold war” between...Data Acquisition (SCADA) system applications created by the Beijing-based Sunway Force Control Technology Company. 26 The National Communications...an advisory explaining that these vulnerabilities could allow an attacker to perform a remote denial-of-service attack against the Sunway SCADA

  12. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    Foreword B150 –Civil Engineering Futures consists of interviews made, articles written, and projects presented in connection with the 150th anniversary celebrations of the study of civil engineering in Denmark. Instead of a historical retrospect, it was decided to look into the future. What...... challenges will the next 150 years bring civil engineers? Researchers and lecturers at DTU’s Department of Civil Engineering (known as DTU Byg) suggested possible events, and we also consulted civil engineers and their business partners in the building industry. In this way, a programme was put together...... theme in twentieth century architecture. Together, civil engineer Peter Rice and architect Ian Ritchie created a paradigm shift with their revolutionary ideas for glass facades supported by cables. Glued and bolted constructions made entirely of glass are now a reality in small-scale projects, yet...

  13. How persistent is civilization growth?

    OpenAIRE

    Garrett, Timothy J.

    2011-01-01

    In a recent study (Garrett, 2011), I described theoretical arguments and empirical evidence showing how civilization evolution might be considered from a purely physical basis. One implication is that civilization exhibits the property of persistence in its growth. Here, this argument is elaborated further, and specific near-term forecasts are provided for key economic variables and anthropogenic CO2 emission rates at global scales. Absent some external shock, civilization wealth, energy cons...

  14. l'Internet Society

    CERN Multimedia

    CERN

    1997-01-01

    Conference of Vinton "Vint" Gray Cerf in the Intercontinental Hostel. Vinton Gray Cerf (born June 23, 1943) is an American computer scientist who is commonly referred to as one of the "founding fathers of the Internet" for his key technical and managerial role, together with Bob Kahn, in the creation of the Internet and the TCP/IP protocols which it uses. He was also a co-founder (in 1992) of the Internet Society (ISOC) which is intended to both promote the views of ordinary users of the Internet, and also serve as an umbrella body for the technical groups developing the Internet (such as the Internet Engineering Task Force). He served as the first president of the Internet Society from 1992-1995.

  15. 22 CFR 1006.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... creates a civil liability for the complained of wrongful acts, or a final determination of liability under... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1006.920 Section 1006.920...) Definitions § 1006.920 Civil judgment. Civil judgment means the disposition of a civil action by any court...

  16. 34 CFR 85.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ... creates a civil liability for the complained of wrongful acts, or a final determination of liability under... 34 Education 1 2010-07-01 2010-07-01 false Civil judgment. 85.920 Section 85.920 Education Office...) Definitions § 85.920 Civil judgment. Civil judgment means the disposition of a civil action by any court...

  17. 21 CFR 1404.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... creates a civil liability for the complained of wrongful acts, or a final determination of liability under... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Civil judgment. 1404.920 Section 1404.920 Food and...) Definitions § 1404.920 Civil judgment. Civil judgment means the disposition of a civil action by any court...

  18. 22 CFR 1508.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... creates a civil liability for the complained of wrongful acts, or a final determination of liability under... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Civil judgment. 1508.920 Section 1508.920...) Definitions § 1508.920 Civil judgment. Civil judgment means the disposition of a civil action by any court...

  19. 22 CFR 208.920 - Civil judgment.

    Science.gov (United States)

    2010-04-01

    ... creates a civil liability for the complained of wrongful acts, or a final determination of liability under... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Civil judgment. 208.920 Section 208.920 Foreign...) Definitions § 208.920 Civil judgment. Civil judgment means the disposition of a civil action by any court...

  20. 2 CFR 180.915 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... creates a civil liability for the complained of wrongful acts, or a final determination of liability under... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Civil judgment. 180.915 Section 180.915... § 180.915 Civil judgment. Civil judgment means the disposition of a civil action by any court...

  1. How Effective Was Civil Affairs in Bosnia?

    Science.gov (United States)

    2013-12-13

    50 Planning the Deployment of the Implementation Force...Allied Rapid Reaction Corps BiH Bosnia and Herzegovina CA Civil Affairs CAO Civil Affairs Operations CIM Civil Information Management CIMIC Civil...and replaced a 2003 version. This publication serves as a guideline for planning and conducting civil military operations in the joint (multi

  2. The 1918 Finnish Civil War Revisited: The Digital Aftermath

    Directory of Open Access Journals (Sweden)

    Anne Heimo

    2014-04-01

    Full Text Available Today heritage sites not only preserve the memory of grandiose moments of history, but also include the darker ones, which were previously either preferably forgotten or went unrecognised. In Finnish history, it is difficult to find a more painful example of these “sites of pain and shame” than the 1918 Civil War. This article examines the different ways that the 1918 Finnish Civil War is commemorated and represented on the Internet today, on both private and institutional websites as well as in social media, from the perspective of participatory history culture and vernacular authority. People have always shared information concerning the past with each other, but the way that this can be observed on the Internet today is novel. Only after the rise of new technology, the Internet and especially Web 2.0, people have had the possibility to share their experiences and interpretations side by side with history professionals to this degree. In relation to memory and heritage politics, this means that we need to re-examine the boundaries between private and public memory and official and unofficial heritage, and recognise new forms of collaboration between audiences and institutions.

  3. Temporal Comparisons of Internet Topology

    Science.gov (United States)

    2014-06-01

    Mean Time IANA Internet Assigned Numbers Authority IP Internet Protocol IPv4 Internet Protocol version 4 IPv6 Internet Protocol version 6 IQR...technological revolutions. With the proliferation of mobile computing across the globe, the Internet serves as a medium of interaction without...networks supporting Internet Protocol version 4 (IPv4) and Internet Protocol version 6 ( IPv6 ). The scamper tool is part of the Ark infrastructure of

  4. Boundaries - US Army Corps of Engineers - St. Paul District (MVP) Civil Works

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — The US Army Corps of Engineers - St. Paul District Civil Works boundary. Boundary is based on 1:24k watershed data and coordination with MVR to determine shared...

  5. Reconstructing Sub-Saharan, Mayan, and Other Prehistoric Civilizations in Mathematical Macro-Theory of Civilizations

    CERN Document Server

    Blaha, S

    2003-01-01

    A study of the Great Zimbabwe Sub-Saharan civilization, Mayan civilization and other prehistoric civilizations within the framework of a mathematical macro theory of civilizations. We show these isolated and early civilizations conform to the general mathematical theory of civilizations in detail.

  6. Código civil colombiano

    OpenAIRE

    Secretaria del Senado Colombia

    2005-01-01

    El Código Civil como lo indica su articulo primero,comprende las disposiciones legales sustantivas que determinan especialmente los derechos de los particulares, por razón del estado de las personas, de sus bienes, obligaciones, contratos y acciones civiles.

  7. Environmental Ethics and Civil Engineering.

    Science.gov (United States)

    Vesilind, P. Aarne

    1987-01-01

    Traces the development of the civil engineering code of ethics. Points out that the code does have an enforceable provision that addresses the engineer's responsibility toward the environment. Suggests revisions to the code to accommodate the environmental impacts of civil engineering. (TW)

  8. Civil Engineering Technology Needs Assessment.

    Science.gov (United States)

    Oakland Community Coll., Farmington, MI. Office of Institutional Planning and Analysis.

    In 1991, a study was conducted by Oakland Community College (OCC) to evaluate the need for a proposed Civil Engineering Technology program. An initial examination of the literature focused on industry needs and the job market for civil engineering technicians. In order to gather information on local area employers' hiring practices and needs, a…

  9. Código civil colombiano

    OpenAIRE

    Secretaria del Senado Colombia

    2005-01-01

    El Código Civil como lo indica su articulo primero,comprende las disposiciones legales sustantivas que determinan especialmente los derechos de los particulares, por razón del estado de las personas, de sus bienes, obligaciones, contratos y acciones civiles.

  10. Codificación civil

    OpenAIRE

    Verdera Server, Rafael

    2012-01-01

    Conferencias sobre la codificación civil: aspectos históricos (R. Aznar) y jurídicos (J.M. Badenas)Actividad complementaria de los Departamentos de Historia del Derecho y Derecho Civil.Grado en Derecho

  11. Social Science and Civil Society

    OpenAIRE

    Hogg, Eddy

    2015-01-01

    This article gives an overview of key social science approaches to civil society. It addresses in turn civil society organizations, volunteering, and philanthropy. For each, it looks at how they are defined, their scope, how social science approaches the study of them, and how social policy has sought to encourage or coordinate them.

  12. Codificación civil

    OpenAIRE

    Verdera Server, Rafael

    2012-01-01

    Conferencias sobre la codificación civil: aspectos históricos (R. Aznar) y jurídicos (J.M. Badenas)Actividad complementaria de los Departamentos de Historia del Derecho y Derecho Civil.Grado en Derecho

  13. Rezension: World Wide War: Angriff aus dem Internet/Cyber War: The Next Threat to National Security and What to Do About It von Richard A. Clarke und Robert K. Knake/by Richard A. Clarke and Robert K. Knake

    Directory of Open Access Journals (Sweden)

    Karl H. Stingeder

    2015-03-01

    Full Text Available Je breiter der Infrastruktur-Anschluss eines Landes an das World Wide Web, desto größer die Angriffsfläche im Fall eines Netzkriegs. Die Messung der virtuellen Kampfkraft erfolgt auf Basis von drei Faktoren: Offensivkraft, Defensivfähigkeit und die Abhängigkeit vom Internet. Die USA verfügen als "Supermacht" zwar über die größte virtuelle Offensivkraft, gleichzeitig steht die Nation Cyberangriffen sehr verwundbar gegenüber. Dagegen sind in Nordkorea kaum Systeme vom Internet abhängig. Obwohl die offensiven Netzkriegskapazitäten Nordkoreas verhältnismäßig gering sind, präsentiert sich die virtuelle Kampfkraft des nordkoreanischen Regimes in Bestform. Die Verwundbarkeit ziviler Systeme, insbesondere der Energieversorgung, muss in direkter Korrelation mit deren Anknüpfung an das Internet betrachtet werden. The more broadly connected a country’s infrastructure and energy distribution, the greater its vulnerability in the event of a cyber war. Measuring this virtual fighting power is based on three factors: offensive and defensive strength, as well as dependency on the Internet. As a superpower, the USA has the greatest virtual offensive strength available. At the same time, the nation is most susceptible to cyber attacks and therefore most vulnerable. By contrast, North Korea’s offensive cyber fighting power is relatively small, but its overall cyber war capabilities are cutting-edge. The vulnerability of civil systems, especially power supply, must be viewed in direct correlation to their connection to the Internet.

  14. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  15. The Ambivalences of Civil Society

    Directory of Open Access Journals (Sweden)

    Henrik Kaare Nielsen

    2008-07-01

    Full Text Available This article discusses the conceptual heterogeneity in the field of ‘civil society’ in the light of a distinction between positions that reflect civil society as a democratic-emancipatory category and positions that consider civil society from the perspective of the state: as an instrumental resource for the technocratic planning of the competitive nation state.The article discusses the implications and perspectives in these two different strategic scenarios for conceptualizing civil society. The argument is made that civil society in relation to democratic citizenship should basically rather be understood as a concept for specific, communicative principles for institutionalizing societal relations and organizing public experience than as an overall concept for third sector organizations.

  16. Sustainability issues in civil engineering

    CERN Document Server

    Saride, Sireesh; Basha, B

    2017-01-01

    This compilation on sustainability issues in civil engineering comprises contributions from international experts who have been working in the area of sustainability in civil engineering. Many of the contributions have been presented as keynote lectures at the International Conference on Sustainable Civil Infrastructure (ICSCI) held in Hyderabad, India. The book has been divided into core themes of Sustainable Transportation Systems, Sustainable Geosystems, Sustainable Environmental and Water Resources and Sustainable Structural Systems. Use of sustainability principles in engineering has become an important component of the process of design and in this context, design and analysis approaches in civil engineering are being reexamined to incorporate the principles of sustainable designs and construction in practice. Developing economies are on the threshold of rapid infrastructure growth and there is a need to compile the developments in various branches of civil engineering and highlight the issues. It is th...

  17. 76 FR 71431 - Civil Penalty Calculation Methodology

    Science.gov (United States)

    2011-11-17

    ... TRANSPORTATION Federal Motor Carrier Safety Administration Civil Penalty Calculation Methodology AGENCY: Federal... its civil penalty methodology. Part of this evaluation includes a forthcoming explanation of the... methodology for calculation of certain civil penalties. To induce compliance with federal regulations,...

  18. Proactive Botnet Detection and Defense at Internet scale

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Pras, Aiko; Dreo, G.

    Botnets provide the basis for various cyber-threats. However, setting up a complex botnet infrastructure often involves registration of domain names in the domain name system (DNS). Active as well as passive monitoring approaches can be used in the detection of domains that are registered for

  19. Proactive Botnet Detection and Defense at Internet scale

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Pras, Aiko; Dreo, G.

    2016-01-01

    Botnets provide the basis for various cyber-threats. However, setting up a complex botnet infrastructure often involves registration of domain names in the domain name system (DNS). Active as well as passive monitoring approaches can be used in the detection of domains that are registered for botnet

  20. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  1. [To define internet addiction].

    Science.gov (United States)

    Tonioni, Federico

    2013-01-01

    Internet addiction is a new behavioral disorder difficult to define, especially when referring to young teenagers who make great use of web-mediated relationships. It's necessary to separate the cases of overt dependency on those in which the abuse of internet seems to have a different value, offering the only way to achieve the possible relationship. Internet is mediating a new way of communicating and thinking, this may favor the onset of clinical phenomena intended to surprise.

  2. Countering Internet Extremism

    Science.gov (United States)

    2009-01-01

    literally examine hundreds of books and speeches. Since the purpose of this work is examining ways to counter an extremist’s Internet use of the...provide differing perspectives on how to counter extremist Internet use . A 2008 New York Times article indirectly offers some methods. Writers Eric...or scholars have the most potential to effectively counter extremist Internet use . Such efforts could help to stifle some of the issues that

  3. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  4. Internet Banking System Prototype

    CERN Document Server

    Alnaqeib, Rami; Jalab, Hamid A; Zaidan, M A; Hmood, Ali K

    2010-01-01

    Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.

  5. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  6. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  7. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  8. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  9. Degree-based attacks and defense strategies in complex networks

    Science.gov (United States)

    Yehezkel, Aviv; Cohen, Reuven

    2012-12-01

    We study the stability of random scale-free networks to degree-dependent attacks. We present analytical and numerical results to compute the critical fraction pc of nodes that need to be removed for destroying the network under this attack for different attack parameters. We study the effect of different defense strategies, based on the addition of a constant number of links on network robustness. We test defense strategies based on adding links to either low degree, middegree or high degree nodes. We find using analytical results and simulations that the middegree nodes defense strategy leads to the largest improvement to the network robustness against degree-based attacks. We also test these defense strategies on an internet autonomous systems map and obtain similar results.

  10. Psychopathy, criminal responsibility, and civil commitment as a sexual predator.

    Science.gov (United States)

    Schopp, R F; Slain, A J

    2000-01-01

    Recent judicial decisions regarding commitment under sexual predator statutes and commentary addressing the legal significance of psychopathy provide an interesting opportunity to reflect upon the exculpatory significance of psychopathy and the appropriate relationship between criminal conviction and police power civil commitment. This paper examines the legal significance of psychopathy for the purposes of criminal responsibility and of civil commitment under sexual predator statutes. By examining the significance of psychopathy for each of these legal institutions, it clarifies our understanding of the legal significance of psychopathy and of the relationship between these institutions. This process illuminates the defensible functions and boundaries of each institution and clarifies the nature of the impairment that should qualify an individual for confinement by each. This analysis interprets criminal conviction and police power commitment, including sexual predator commitment, as integrated institutions of social control intended to provide a coherent approach to psychopaths as well as to others who require state intervention under the police power.

  11. Coordinating medical civil military operations in Multinational Division-North.

    Science.gov (United States)

    Smyrski, John A; Rainey, McKinley; Roach, Shane; Stevens, Mark; Hernandez, Gloria; Vargo, Ruth

    2010-11-01

    Medical civil military operations (MCMO) are part of military civil capacity-building efforts within the full spectrum of military operations, from war to military operations other than war. In 2008-2009 during Operation Iraqi Freedom, the Division Surgeon's Section (DSS) of the 25th Infantry Division (25ID) and Multinational Division-North developed an innovative MCMO program in northern Iraq. The program centered on understanding and mapping key relationships, empowering brigade-level programs, and leveraging technology to identify and share best practices. The DSS mapped the critical relationships within and between the three entities affecting MCMO: the government of Iraq (GOI), Department of State (DOS), and the Department of Defense (DOD). A division MCMO working group was then created along with processes to facilitate MCMO project execution and program management. The structure and organization of the 25ID MCMO program lend themselves to other operational environments requiring synchronization of medical capacity-building efforts.

  12. Being an Efficient or Dialogue-Oriented Rural Municipality on the Net: Framing Civil Servants' Confidence in E-Services

    OpenAIRE

    Bertil Rolandsson; Ulric Björck

    2008-01-01

    The impact of the Internet on citizens' confidence in public services has been described in general terms. The purpose of this study is to analyse how civil servants in the context of a rural municipality bestow confidence on e-services. Based on four qualitative group interviews, we analyse the interpretative frames that guide how they understand a confident use of public services on the Internet. Our results illustrate the importance of considering the organisational context when studying h...

  13. How persistent is civilization growth?

    CERN Document Server

    Garrett, Timothy J

    2011-01-01

    In a recent study (Garrett, 2011), I described theoretical arguments and empirical evidence showing how civilization evolution might be considered from a purely physical basis. One implication is that civilization exhibits the property of persistence in its growth. Here, this argument is elaborated further, and specific near-term forecasts are provided for key economic variables and anthropogenic CO2 emission rates at global scales. Absent some external shock, civilization wealth, energy consumption and carbon dioxide emissions will continue to grow exponentially at an average rate of about 2.3% per year.

  14. Global Standards of Market Civilization

    DEFF Research Database (Denmark)

    Fund's capacity to formulate a global standard of civilization in its reform programs; and problems in the development of the global trade, including the issue of intellectual property rights. This book will be of strong interest to students and scholars in wide range of fields relating to the study......Global Standards of Market Civilization brings together leading scholars, representing a range of political views, to investigate how global 'standards of market civilization' have emerged, their justification, and their political, economic and social impact. Key chapters show how as the modern...

  15. Jobs Associated with the Internet.

    Science.gov (United States)

    Steinberg, Gary

    1997-01-01

    Discusses a variety of careers that are related to the Internet: webmaster, web developer, systems administrator, programmer/software developer, customer service representative, and other occupations. Provides a primer on the Internet and a guide to Internet terminology. (JOW)

  16. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  17. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  18. Honduras Defense Policy.

    Science.gov (United States)

    1986-04-22

    and its Organization .......... 14 Civil -Military Relations ............................17 Impact of the Military on the Government ........... 18 Ill...Discovered by Columbus in his last voyage in August 1502, Honduras was part of the Mayan Empire that flourished throughout Southern Mexico, Guatemala...34 + " ’- " - ’ ] , . i + .°, +,.o .r+ .* -- 7--- -. * - I . .. .. early 1930’s. Civil wars, armed revolts and political struggle for power was the common denominator

  19. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  20. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  1. Friendships and the Internet

    NARCIS (Netherlands)

    Antheunis, Marjolijn; Berger, Charles; Roloff, Michael

    2016-01-01

    The Internet has effects on how people meet, communicate, and maintain friendships. Internet applications such as social network sites change the way, the frequency with which, and the people with whom individuals keep contact. The current entry describes the sort of friendships that can be distingu

  2. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  3. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...

  4. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  5. Internet and forensic science

    Science.gov (United States)

    Chamakura, Reddy P.

    1997-02-01

    The Internet is a very powerful and inexpensive tool that was created for the free distribution of knowledge and information. The Internet is a learning tool, a research tool, a virtual library without borders and membership requirements, a journal with instant publication, a help desk, and a newspaper/journal with current information. Very soon, when live audio and video transmission is perfected, the Internet also will be a live classroom and everyday conference. Forensic scientists, laboratories and colleges should make use of information already available on the Internet. They also should actively participate and contribute. Very few forensic scientists and laboratories have made their presence felt by setting up their home pages/web pages. But, there is tremendous growth during the past year. Immense benefits from Internet to forensic community are discussed along with the author's personal experience. Creating on-line searchable data bases in all specialties of forensic science is an urgent need. Leading forensic journals should take a lead and create on-line searchable indexes with abstracts. On line electronic publishing, collaborative research/paper publishing or editing is easy, fast, economical and convenient through the use of the Internet. Creation of Internet repositories of unpublished papers is an idea worth looking into. Internet also can be used to give training, re-training or advanced training to students/forensic scientists.

  6. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  7. Measuring internet skills

    NARCIS (Netherlands)

    Deursen, van A.J.A.M.; Dijk, van J.A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed, applie

  8. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  9. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  10. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  11. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  12. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  13. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  14. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  15. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  16. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  17. Credit and civilization.

    Science.gov (United States)

    Newton, Tim

    2003-09-01

    This paper analyses financial credit in order to re-examine the work of Norbert Elias, particularly his association of interdependency complexity with social discipline, and his approach to contradiction. Following a discussion of these issues, the paper examines Elias's writing on money and explores the emergence of financial credit networks in early modern England. Attention is paid to credit networks and social discipline, to credit and the state, and to the contradictory images associated with the transition to modern cash economies. From one perspective, early modern credit networks might be read as a confirmation of Elias, particularly his argument that interdependency complexity, changing power balances and self-restraint are interwoven. Yet the development of modern cash money raises questions, not just in relation to Elias's treatment of money, but also with regard to his assumptions about social discipline and his approach to ambivalence and contradiction. Drawing on the foregoing discussion, the paper argues that the relation between interdependency complexity and social discipline is contingent and variable, and that interdependency complexity may simultaneously encourage contradictory processes, such as those of civilizing and barbarity.

  18. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  19. Sociedade civil, capital social e democracia no Brasil

    Directory of Open Access Journals (Sweden)

    Emerson Oliveira do Nascimento

    2012-06-01

    Full Text Available Efforts in Brazil to strengthen its democracy, from the beginning of the democratization process, have generated administrative decentralization and a defense of the expanded participation of citizens in the political decision-making and oversight of government actions and their public managers. Such efforts have been emphasized as a way to reverse the process of pressing social disintegration, reflected in the decrease of state functions irresponsible from the reformism of the 1990s. We argue here that the adoption of such a perspective has fostered creativity associative wanted civil society as some of its advocates, however, has limited the possibilities of articulating a common promotion of popular participation.

  20. Internet addiction and antisocial internet behavior of adolescents.

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  1. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  2. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  3. Teaching Mathematics to Civil Engineers

    Science.gov (United States)

    Sharp, J. J.; Moore, E.

    1977-01-01

    This paper outlines a technique for teaching a rigorous course in calculus and differential equations which stresses applicability of the mathematics to problems in civil engineering. The method involves integration of subject matter and team teaching. (SD)

  4. DECWEB - Internet Fiscal Statement Submission

    Directory of Open Access Journals (Sweden)

    Mihai Ianciu

    2009-12-01

    Full Text Available

    The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C. In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet.

    DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.

  5. DECWEB - Internet Fiscal Statement Submission

    Directory of Open Access Journals (Sweden)

    Mihai Ianciu

    2009-12-01

    Full Text Available The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C. In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet. DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.

  6. Arguments completed in suit over Internet censorship.

    Science.gov (United States)

    1996-05-31

    Closing remarks on the Communications Decency Act, requiring Internet providers to censor materials that may be unsuitable for minors, were heard on May 10, 1996. The American Civil Liberties Union (ACLU) is leading the challenge to the law. Because information about HIV necessarily must deal with sexual practices, HIV/AIDS service providers would be forced to either avoid talking about the subject or find ways to prevent minors from accessing the information. During the oral arguments, U.S. Justice Department attorney Anthony Coppolino tried to show that the Internet is more like a broadcast medium such as television or radio and is different from newspapers, which enjoy a constitutional protection against government censorship. ACLU attorney Christopher Hansen disagreed, saying the reverse is true. The ACLU said parental control mechanisms such as SurfWatch, Net Nanny, and Cyberpatrol are commercially available to parents who wish to restrict their children's Internet access and are more effective than the government's proposal. The court is expected to rule on the lawsuit in several weeks. An appeal to the U.S. Supreme Court is expected, regardless of the outcome.

  7. 5 CFR 919.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Civil judgment. 919.920 Section 919.920 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 919.920 Civil judgment. Civil judgment...

  8. Communication Needs of Thai Civil Engineering Students

    Science.gov (United States)

    Kaewpet, Chamnong

    2009-01-01

    This article reports on an examination of the communication needs of a group of Thai civil engineering students. Twenty-five stakeholders helped identify the communication needs of the students by participating in individual interviews. These included employers, civil engineers, civil engineering lecturers, ex-civil engineering students of the…

  9. Space civil engineering - A new discipline

    Science.gov (United States)

    Sadeh, Willy Z.; Criswell, Marvin E.

    1991-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding the Civil Engineering know-how and practice to the development and maintenance of infrastructure on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University under a recently established NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts of the curriculum in the Space Civil Engineering Option at both undergraduate and graduate levels are presented. The role of Space Civil Engineering in the Space Program is discussed.

  10. Internet and child pornography

    Directory of Open Access Journals (Sweden)

    Seda Çağlar

    2010-04-01

    Full Text Available Nowadays, internet use and access is becoming increasingly common as a great entertainment, communication and educational resource for children as well as for adults. Internet is a perfect environment for children, for exploring the world, learning and having fun. However, access to illegal sites that contain violence and sexuality, and contact dangerous people are among the particular risks for children using the internet. It is a known fact that, internet and developing technology make the production and distribution of child pornography cheaper and easier. There has been consensus on the need of creating a plan and increasing the awareness in the community for the fight against child pornography. Because of the increasing internet use and the risk for children mentioned, nurses got new responsibilities. Nurses have to inform society, especially families and children, about safe internet use. In this review, legal regulations about the fight against child pornography on the internet, the reasons that lay the ground for child pornography and their negative effects on children has been addressed.

  11. Pedophilia on the Internet.

    Science.gov (United States)

    Deirmenjian, John M

    2002-09-01

    The Internet provides adults and children with a medium for professional and personal communication throughout the world. As widespread communication in cyberspace grows exponentially, the potential for Internet-related crimes, such as cyberstalkng, has accelerated. Children are particularly vulnerable to sexual predators, such as pedophiles, on the Internet. This article reports cases of pedophiles who used the information superhighway to exploit child victims. Two models of pedophilia on the Internet are discussed: a trust-based seductive model and a direct sexual model. This article explores the role that mental health professionals may play in the assessment of Internet pedophilia. For example, mental health professionals may provide psychiatric treatment to victims of Internet pedophiles. Psychiatrists may be involved in the evaluation of perpetrators of Internet crimes in a clinical or forensic setting. Governmental agencies, the criminal justice system, school, or the media may request consultations by mental health professionals as part of a multi-disciplinary approach to prevention. Methods of government intervention are discussed.

  12. Hybrid internet access

    Science.gov (United States)

    Arora, Vivek; Baras, John S.; Dillon, Douglas; Falk, Aaron; Suphasindhu, Narin

    1995-01-01

    Access to the Internet is either too slow (dial-up SLIP) or too expensive (switched 56 kbps, frame relay) for the home user or small enterprise. The Center for Satellite and Hybrid Communication Networks and Hughes Network Systems have collaborated using systems integration principles to develop a prototype of a low-cost hybrid (dial-up and satellite) newtork terminal which can deliver data from the Internet to the user at rates up to 160 kbps. An asymmetric TCP/IP connection is used breaking the network link into two physical channels: a terrestrial dial-up for carrying data from the terminal into the Internet and a receive-only satellite link carrying IP packets from the Internet to the user. With a goal of supporting bandwidth hungry Internet applications such as Mosaic, Gopher, and FTP, this system has been designed to support any Intel 80386/486 PC, any commercial TCP/IP package, any unmodified host on the Internet, and any of the routers, etc., within the Internet. The design exploits the following three observations: 1) satellites are able to offer high bandwidth connections to a large geographical area, 2) a receive-only VSAT is cheap to manufacture and easier to install than one which can also transmit, and 3) most computer users, especially those in a home environment, will want to consume much more information than they generate. IP encapsulation, or tunneling, issued to manipulate the TCP/IP protocols to route packets asymmetrically.

  13. Ciencia y sociedad civil

    Directory of Open Access Journals (Sweden)

    Ziman, John

    2003-06-01

    Full Text Available This paper analyses the relationship between scientific knowledge and the societies in which it is produced. After considering the diverse societal roles science has performed in different types of society, the discussion focuses on science’s role in democratic and pluralistic societies. Opposite to the increasing instrumental role knowledge production plays nowadays, for which it has been named «post-academic science» or «technoscience», non instrumental roles of traditional academic research are defended. It is argued that only if academic science keeps its autonomy and integrity from political and corporate interests, it may serve civil society by offering impartial and trustworthy knowledge to balance biases produced by the features of post-academic science.

    En este artículo se analizan las relaciones del conocimiento científico con las sociedades en las que se produce. Tras repasar sus diversas funciones en tipos distintos de sociedades, la discusión se centra en los fines de la ciencia en las sociedades democráticas pluralistas. Frente al cada vez mayor rol instrumental de la ciencia, por el que ha recibido los nombres de «ciencia postacadémica» o «tecnociencia», se defienden los roles no instrumentales tradicionales de la investigación académica clásica. Se argumenta que sólo si la ciencia académica mantiene su autonomía y su integridad frente a intereses políticos o empresariales podrá ser de utilidad al público al ofrecerle conocimiento imparcial y fidedigno frente a los sesgos producidos por la naturaleza propia de la ciencia postacadémica.

  14. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  15. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  16. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  17. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  18. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  19. Evaluation of the Air Force Office of Special Investigations Conduct of Internet Based Operations and Investigations (REDACTED)

    Science.gov (United States)

    2016-04-25

    Introduction 2 │ DODIG-2016-075 increasing number of children and teenagers using the Internet, the proliferation of unlawful images, contraband images, images...violence, brandishing a weapon, discharging or using a weapon, or threatening to discharge or use a weapon except in self -defense, in defense of other DoD...persons in the vicinity, or in defense of non-DoD persons; • evidence collection, security functions, crowd and traffic control , and operating

  20. Visualizing Internet routing changes.

    Science.gov (United States)

    Lad, Mohit; Massey, Dan; Zhang, Lixia

    2006-01-01

    Today's Internet provides a global data delivery service to millions of end users and routing protocols play a critical role in this service. It is important to be able to identify and diagnose any problems occurring in Internet routing. However, the Internet's sheer size makes this task difficult. One cannot easily extract out the most important or relevant routing information from the large amounts of data collected from multiple routers. To tackle this problem, we have developed Link-Rank, a tool to visualize Internet routing changes at the global scale. Link-Rank weighs links in a topological graph by the number of routes carried over each link and visually captures changes in link weights in the form of a topological graph with adjustable size. Using Link-Rank, network operators can easily observe important routing changes from massive amounts of routing data, discover otherwise unnoticed routing problems, understand the impact of topological events, and infer root causes of observed routing changes.

  1. Internet of Drones

    National Research Council Canada - National Science Library

    Gharibi, Mirmojtaba; Boutaba, Raouf; Waslander, Steven L

    2016-01-01

    The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes...

  2. internet, utilisation, lectu

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management

    commonly or basically used for the purposes of information, communication, education ... people with information, the Internet has now become a social networking ..... Madu, E. C. (2008) Fundamentals of modern reference services: Manual vs ...

  3. Internet access to ionosondes

    Science.gov (United States)

    Galkin, I. A.; Kitrosser, D. F.; Kecic, Z.; Reinisch, B. W.

    1999-01-01

    Connecting ionosondes to the Internet gives easy access to real-time information on ionospheric conditions. Some of the ionosonde sites provide just the ionogram displays, others give in addition the scaled ionospheric characteristics directly usable for frequency management and HF channel assessment. Some sounders also store days or months of station data, which makes it possible remotely to evaluate the time history of geophysical events. The Internet link is also a convenient means for remote system maintenance and control. The paper addresses various aspects of the Internet ionosonde scenario, including data base support, WWW publishing, user interface, security, and data format. A list of Internet accessible ionosonde stations is provided with a brief description.

  4. Internet research in psychology.

    Science.gov (United States)

    Gosling, Samuel D; Mason, Winter

    2015-01-03

    Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.

  5. INTERNET: MONITORED FREEDOM

    Directory of Open Access Journals (Sweden)

    Fernando Kuschnaroff Contreras

    2012-12-01

    Full Text Available The Internet is a phenomenal research and information tool. It has entered the lives of people in an extremely fast way, offering a sense of freedom, and discoveries. This study presents the Internet usage in organizations, along with the use of equipment and information systems supplied by the employer and personal Internet usage at work. The subjects of the present research are businesspeople chosen among employees with a university degree in companies in the City of Curitiba, in the State of Paraná, with leading, managerial or operational occupations, with access to the Internet in their offices as well as at home. The study proposal consists of a critical analysis on the theme.

  6. New 'Internet' network soon

    CERN Multimedia

    Parthasarathy, A

    2003-01-01

    The Geneva-based European Particle Research Laboratory (CERN) is to link 10 scientific establishments worldwide in a network of computers that might well be the prototype for the Internet's next `avatar' (1 page).

  7. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  8. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  9. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-07-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained.

  10. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  11. INTERNET: PENGIRIMAN FILE

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu alasan pengguna komputer untuk berhubungan dengan Internet adalah mendapat kesempatan untuk menyalin ('download' informasi yang tersimpan dari server jaringan komputer lain (misalnya menyalin program aplikasi komputer, data mentah, dan sebagainya. File Transfer  Protocol (FfP adalah cara di Internet untuk mengirim file dari satu tempat ke komputer pengguna. Untuk keperluan ini dapat menggunakan program FTP khusus atau dengan menggunakan Web browser.

  12. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  13. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  14. Learning Internet of Things

    CERN Document Server

    Waher, Peter

    2015-01-01

    If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

  15. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  16. Global Internet Video Classroom: A Technology Supported Learner-Centered Classroom

    Science.gov (United States)

    Lawrence, Oliver

    2010-01-01

    The Global Internet Video Classroom (GIVC) Project connected Chicago Civil Rights activists of the 1960s with Cape Town Anti-Apartheid activists of the 1960s in a classroom setting where learners from Cape Town and Chicago engaged activists in conversations about their motivation, principles, and strategies. The project was launched in order to…

  17. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  18. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  19. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  20. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  1. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  2. Web-Based Expert System for Civil Service Regulations: RCSES

    CERN Document Server

    Hogo, Mofreh; Mousa, Fouad

    2010-01-01

    Internet and expert systems have offered new ways of sharing and distributing knowledge, but there is a lack of researches in the area of web based expert systems. This paper introduces a development of a web-based expert system for the regulations of civil service in the Kingdom of Saudi Arabia named as RCSES. It is the first time to develop such system (application of civil service regulations) as well the development of it using web based approach. The proposed system considers 17 regulations of the civil service system. The different phases of developing the RCSES system are presented, as knowledge acquiring and selection, ontology and knowledge representations using XML format. XML Rule-based knowledge sources and the inference mechanisms were implemented using ASP.net technique. An interactive tool for entering the ontology and knowledge base, and the inferencing was built. It gives the ability to use, modify, update, and extend the existing knowledge base in an easy way. The knowledge was validated by ...

  3. [Regulating the internet: a comparative analysis of Brazil, Chile, Spain, the US, and France].

    Science.gov (United States)

    Segurado, Rosemary; Lima, Carolina Silva Mandú de; Ameni, Cauê S

    2015-12-01

    Global governance is of key concern in the current debate over the workings of the world's computer network, and Brazil has played a notable role in this process, especially after approval of the Marco Civil da Internet (law 12.965, april 23, 2014), which defines Brazil's regulatory framework for the internet. Dubbed the internet bill of rights, this law sets out the principles, guarantees, rights, and duties of internet users and providers in Brazil. Based on the fundamental categories of net neutrality, internet users' right to privacy, and copyright discussions from the perspective of intellectual property, the article offers a comparative analysis of regulations in five countries: Brazil, Chile, Spain, the US, and France.

  4. The fallacy of "equal treatment" in Brazil's bill of rights for internet users A falácia da "igualdade de tratamento" na carta brasileira de direitos dos usuários da internet

    Directory of Open Access Journals (Sweden)

    J. Gregory Sidak

    2012-12-01

    Full Text Available The "Brazilian bill of rights for internet users," or "marco civil," has been under consideration at the brazilian congress since 2011. Marco civil's provisions for network neutrality have been particularly controversial. Proponents of network neutrality in Brazil advocate for the "equal treatment" of all data packets, including banning internet service providers from offering to content providers the option to purchase enhanced quality of service in the delivery of data packets. These network neutrality rules conflict with the other goals and principles of marco civil-particularly goals to promote internet access, to foster innovation, and to protect the constitutional right of freedom of speech and the free flow of information.A "carta Brasileira de direitos dos usuários da internet," ou "marco civil," tramita no congresso Brasileiro desde 2011. As disposições do marco civil relativas à neutralidade de rede são particularmente controversas. Os defensores da neutralidade de rede no Brasil advogam pela "igualdade de tratamento" de todos os pacotes de dados, inclusive proibindo que provedores de serviço de acesso à internet ofereçam aos provedores de conteúdo a opção de adquirir uma melhor qualidade de serviço na entrega de pacotes de dados. Essas disposições relativas à neutralidade de rede conflitam com outros objetivos e princípios do marco civil - especialmente os objetivos de promover o acesso à internet, promover a inovação, e garantir o direito constitucional de liberdade de expressão e informação.

  5. Entering the Internet Race: The Early Years of the Internet and Internet Commerce in Japan

    Directory of Open Access Journals (Sweden)

    Carin Holroyd

    2005-01-01

    Full Text Available Ten years ago, Japan lagged well behind in the race to capitalize on the commercial and other possibilities of the Internet. Cumbersome government regulations and an Internet-averse business community combined with aspects of Japanese society to make the Internet less compelling in Japan than other countries. The advent of the mobile Internet resulted in an exponential growth in Japanese e-commerce and m-commerce, vaulting the country into the world lead in the development of profitable Internet-based business models. This essay summarizes the early history of the Internet in Japan and outlines the general contours of Internet commerce in the country.

  6. The Interplanetary Internet: A Communications Infrastructure for Mars Exploration

    Science.gov (United States)

    Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.

    2002-01-01

    A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the

  7. The Civil Law Approach of Internet Security:The Personal Information Right in Context of Online Privacy as A Starting Point%网络安全中的民法进路--以网络隐私语境中的个人信息权为起点

    Institute of Scientific and Technical Information of China (English)

    吴才毓

    2015-01-01

    Compared with the right to privacy, personal information right in the Internet context is a new kind of right of personality, which can be established through the provision of personal information protection in Internet Security Law. Protection system of personal information right in our country can be functioned by regulatory agencies and industry self ̄regulation. In the autonomy part, privacy right protection organization and the third party certification body can be independ ̄ent . To realize the establishment of Internet security system, judicial way and man ̄agement way should be combined, and the provision of Judicial Interpretation of In ̄ternet Infringement will make judicial guidance identity card system on line come true. The existing rule of “Notice, Delete” can be transformed into the rule of“Notice, Delete, Counter Notice, Notification”, so that the Internet service pro ̄vider shall not permanently delete the information requirements by users, but to wait for the notice period in order to balancing the business operation autonomy of the Internet providers and users’ right to publish the information and the copyright, so as to predict the consequences of Internet service provider after receiving the no ̄tification.%与隐私权相较,个人信息权是一种网络环境中的新兴人格权,可以经由《网络安全法》个人信息保护方面的条文确立。我国可以采用机构监管与行业自律相结合的模式保障个人信息权。自律模式部分,网络隐私权保护组织以及第三方认证机构可以逐步独立。我国应当以司法途径与管理途径相结合的方式实现网络安全,在线上身份证制度的构建上,应由《网络侵权司法解释》作出司法导向。现有的“通知—删除”规则可以改制为“通知—删除—反通知—恢复”规则,网络服务提供商并不应网民的要求永久性删除信息,而是需要等待反通知期间

  8. B 150 civil engineering futures

    DEFF Research Database (Denmark)

    theme in twentieth century architecture. Together, civil engineer Peter Rice and architect Ian Ritchie created a paradigm shift with their revolutionary ideas for glass facades supported by cables. Glued and bolted constructions made entirely of glass are now a reality in small-scale projects, yet...... related to sustainability – a Workshop on Traffic. The workshop discussed traffic prognoses and the way they are used in the preparation of urban transport and traffic strategies. Civil engineer Jonas Eliasson spoke about the experience in Sweden of developing a database for traffic prognoses. The main...... to develop a technically advanced form of aesthetics. The Master Class in low energy buildings was led by civil engineer, Svend Svendsen, a Professor at DTU Byg. Together with colleagues and students, he has achieved an extensive knowledge of Integrated Design. In fact, the situation is that our knowledge...

  9. Global Standards of Market Civilization

    DEFF Research Database (Denmark)

    Global Standards of Market Civilization brings together leading scholars, representing a range of political views, to investigate how global 'standards of market civilization' have emerged, their justification, and their political, economic and social impact. Key chapters show how as the modern...... thought, as well as its historical application part II presents original case studies that demonstrate the emergence of such standards and explore the diffusion of liberal capitalist ideas through the global political economy and the consequences for development and governance; the International Monetary...... Fund's capacity to formulate a global standard of civilization in its reform programs; and problems in the development of the global trade, including the issue of intellectual property rights. This book will be of strong interest to students and scholars in wide range of fields relating to the study...

  10. Artificial Intelligence in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Pengzhen Lu

    2012-01-01

    Full Text Available Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applications of artificial intelligence in civil engineering, including evolutionary computation, neural networks, fuzzy systems, expert system, reasoning, classification, and learning, as well as others like chaos theory, cuckoo search, firefly algorithm, knowledge-based engineering, and simulated annealing. The main research trends are also pointed out in the end. The paper provides an overview of the advances of artificial intelligence applied in civil engineering.

  11. Space Civil Engineering option - A progress report

    Science.gov (United States)

    Criswell, Marvin E.; Sadeh, Willy Z.

    1992-01-01

    Space Civil Engineering is an emerging engineering discipline that focuses on extending and expanding Civil Engineering to the development, operation, and maintenance of infrastructures on celestial bodies. Space Civil Engineering is presently being developed as a new discipline within the Department of Civil Engineering at Colorado State University and with support of the NASA Space Grant College Program. Academic programs geared toward creating Space Civil Engineering Options at both undergraduate and graduate levels are being formulated. Basic ideas and concepts and the current status of the curriculum in the Space Civil Engineering Option primarily at the undergraduate level are presented.

  12. Sociedad civil y capital social

    OpenAIRE

    José Fernández Santillán

    2009-01-01

    Este documento aborda el tema de la democracia desde una perspectiva opuesta al llamado neoinstitucionalismo; es decir, se orienta a analizar los procesos de democratización desde la base de la sociedad civil y, en es pe cial, desde lo que se conoce como el cap i tal so cial. Desde mediados de la década de 1980, el tema de la democracia desde la perspectiva de la sociedad civil fue cobrando cada vez mayor relevancia. Esta tendencia se vio reforzada por la caída del Muro de Berlín el 9 de nov...

  13. Tendencias del Derecho civil (2002)

    OpenAIRE

    Arellano Gómez, Francisco Javier

    2002-01-01

    Durante el año 2.002 han dado a luz, en el campo del Derecho Civil, un conjunto de leyes que suponen una importante actualización normativa ante determinadas necesidades presentadas por la dinámica realidad socio-económica de España, en un contexto de acelerada tecnificación, creciente vitalidad y fluidez de tejido social, y de progresiva armonización legislativa con los países de nuestro entorno. Para este informe de Derecho Civil hemos preferido seguir, por razón de mejor carácter sistemáti...

  14. DDoS Attack and Defense: Review of Some Traditional and Current Techniques

    OpenAIRE

    Aamir, Muhammad; ZAIDI, Mustafa Ali

    2014-01-01

    Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper is the coverage of many aspects of countering DDoS attacks including new research on the topic. We survey different papers describing methods of defense again...

  15. Sources of Hong Kong Civil Legal Proceedings Legal Regulation

    Directory of Open Access Journals (Sweden)

    Elena P. Ermakova

    2014-06-01

    Full Text Available In the present article author gives characteristic of the civil legal proceedings sources of legal regulation in Hong Kong: statute law, delegated legislation, general law, the Chinese common law. System of the Hong Kong law sources completely corresponds to the system of England civil procedural law sources. Till June 30, 1997 Hong Kong was a colony of the Great Britain. Since 1997 Hong Kong became a special administrative region of the People's Republic of China (PRC. Laws of Hong Kong on courts, on proofs, on the legal aid, on administration of justice contain references to the corresponding English legal acts. The feature of the Hong Kong legal system is due to the fact that Hong Kong Basic Law of 1990 sets on the territory of the country a simultaneous action of two systems of the legislation until 2047: legislation of Hong Kong created before 1997 under the influence Great Britain and legislation of People's Republic of China which regulates questions of foreign policy and country’s defense. The list of sources of the civil procedural law of Hong Kong includes: 1 statute law; 2 delegated legislation (rule of courts; 3 general law (precedents. Author gives opinions of jurists and practicians both from China, and from other countries, present own definitions and justifications.

  16. 32 CFR 720.24 - Interviews and depositions in connection with civil litigation in matters pertaining to official...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Interviews and depositions in connection with... Interviews and depositions in connection with civil litigation in matters pertaining to official duties. Requests to interview, depose, or call as witnesses, current or former members or civilian employees of...

  17. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz

    2015-01-01

    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  18. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  19. Internet resources for diabetes

    Directory of Open Access Journals (Sweden)

    Yadav Hariom

    2005-01-01

    Full Text Available Internet is transforming lives of many people in the world. Nowadays Internet has become one of the most common media to extract information of interest to researchers. The Internet is composed of a large number of smaller interconnected networks called Intranets. These Intranets connect thousands computers enabling them to share information with each other and to share various resources such as powerful super computers, software and databases of information. It has made it possible for people all over the world to effectively and inexpensively communicate with each other. The Internet has become world′s biggest library where retrieval of scientific resources is only a mouse click away. The geometric growth in Internet usage is mainly due to the great success of "World Wide Web". Various useful databases on diabetes are already on ′the Net′ and many more being added regularly. The present article is an attempt to provide a review of several sites that may be of great significance to the diabetes researchers before execution for new assignment/project.

  20. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  1. Job Prospects for Civil Engineers.

    Science.gov (United States)

    Basta, Nicholas

    1985-01-01

    Government programs and renewed industrial activity have combined with stable enrollments to create bright job prospects for civil engineers. Areas with good opportunities include highway reconstruction and rehabilitation, water-resource management, and new factory construction. The subspecialty of structural engineering has a growing need in…

  2. Primary Sources Enliven Civil War

    Science.gov (United States)

    Robelen, Erik W.

    2011-01-01

    Today, a growing number of teachers are moving beyond the textbook in teaching about the war, and U.S. history more broadly. Teachers are digging directly into primary sources and harnessing technology, all in an attempt to help students better understand the past and bring it to life. Doing so may be especially important with the Civil War,…

  3. Aging of civil explosives (Poster)

    NARCIS (Netherlands)

    Krabbendam-La Haye, E.L.M.; Klerk, W.P.C. de; Hoen, C. 't; Krämer, R.E.

    2014-01-01

    For the Dutch MoD and police, TNO composed sets with different kinds of civil explosives to train their detection dogs. The manufacturer of these explosives guarantees several years of stability of these explosives. These sets of explosives are used under different conditions, like temperature and

  4. Getting the Civil War Right

    Science.gov (United States)

    Loewen, James W.

    2011-01-01

    William Faulkner famously wrote, "The past is never dead. It's not even past." He would not be surprised to learn that Americans, 150 years after the Civil War began, are still getting it wrong. Did America's most divisive war start over slavery or states' rights? The author says that too many people--including educators--get it wrong. The author…

  5. 1975 Textbooks for French Civilization.

    Science.gov (United States)

    Brown, Jack Davis

    Four 1975 textbooks for French civilization courses are cited including price, suggested level, format and a listing of contents. A review of one text follows: Rey and Santoni, "Quand les Francais parlent: Langue en contexte, culture en contraste," Newbury House Publishers. The reviewer states that this book is basically a sociological study of…

  6. Etica civile e beatitudini evangeliche

    Directory of Open Access Journals (Sweden)

    Nicola Colaianni

    2014-02-01

    Full Text Available Il contributo, sottoposto a valutazione, riproduce il testo dell’intervento nel dibattito a due voci (con il presidente della Corte costituzionale, Gaetano Silvestri a conclusione del convegno “La Bibbia sulle strade dell’uomo” (Messina, 23 novembre 2013, ed è destinato alla pubblicazione negli Atti.SOMMARIO: 1. L’etica civile come etica costituzionale – 2. L’etica evangelica – 3. Irriducibilità? – 4. La promessa e il terzo – 5. La libertà – 6. Il tratto di cammino insieme.  Civil Ethic and Evangelical Beatitudes ABSTRACT The differences between civil ethic and religious ethic, that the Author defines as constitutional principles and evangelic Beatitudes, are well known: it’s common knowledge that the ones are effective in the earthly life while the others are oriented to the eternal life. Nevertheless the Author argues that they both have a common feature before that last analysis: they cross as principles of continuing opposition to unjust society, to “unlawful law”, to spreading apart between the constitutional and evangelic must be and the legislative being of positive law.KEY-WORDS: Civil Ethic – Constitution – Evangelical Beatitudes – Differences - Common Feature.

  7. 17 CIVIL DISOBEDIENCE AND DEMOCRATIC SUSTAINABILITY IN ...

    African Journals Online (AJOL)

    HP

    government businesses were halted for about a week and the government of. President ... Unlike the understanding of civil disobedience in the postmodern world, ... 7 David Lefkowit, “On a Moral Right to Civil Disobedience,” Ethics Vol. 117,.

  8. Civil society and the negotiation of the Framework Convention on Tobacco Control.

    Science.gov (United States)

    Mamudu, H M; Glantz, S A

    2009-01-01

    Tobacco control civil society organisations mobilised to influence countries during the negotiation of the World Health Organisation (WHO) Framework Convention on Tobacco Control (FCTC) between 1999 and 2003. Tobacco control civil society organisations and coalitions around the world embraced the idea of an international tobacco control treaty and came together as the Framework Convention Alliance (FCA), becoming an important non-state actor within the international system of tobacco control. Archival documents and interviews demonstrate that the FCA successfully used strategies, including publication of a newsletter, shaming symbolism and media advocacy to influence policy positions of countries during the FCTC negotiation. The FCA became influential in the negotiation process, by mobilising tobacco control civil society organisations and resources with the help of the Internet, and framing the tobacco control discussion around global public health.

  9. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  10. Internet Congestion Control System

    Directory of Open Access Journals (Sweden)

    Pranoto Rusmin

    2010-10-01

    Full Text Available Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion in the router, whereas the source will adapt the sending rate appropriate with the feedback. These mechanisms are not enough to solve internet congestion problem completely. Therefore, this paper will explain internet congestion causes, weakness, and congestion control technique that researchers have been developed. To describe congestion system mechanisms and responses, the system will be simulated by Matlab.

  11. INTERNET IN FISHERIES

    Directory of Open Access Journals (Sweden)

    Daniel Matulić

    2006-01-01

    Full Text Available Internet is a global communication system interconnected with computer networks and intended to exchange the information of any kind. It is frequently called »network of all the networks« because it incorporates thousands and thousands of various computer networks all around the world and in order to communicate, has the same technical standards. The Internet has become an exclusive, unique source of information forever growing population. It has also become an ideal communication channel because of its dynamics, interaction, tractability and miraculously manageable updating of the content published. Nowadays, when fisheries starts playing and important role in Croatia, many people seek professional advice and guidance via Internet in order to fulfil their demanding professional tasks.

  12. The Internet for Librarians

    Science.gov (United States)

    Grothkopf, U.

    Librarianship is currently undergoing major changes. New information sources, accessible via the "network of networks", the Internet, offer opportunities which were previously unknown, but which require continuous ongoing learning. The Internet seems to be organized badly or not at all. The poor appearance might lead to an underestimation of its value. In the following, an introduction to the main functions will be given in order to facilitate understanding and use of the Internet. E-Mail, FTP (File Transfer Protocol) and Telnet will be covered, as well as Mailing lists, Newsgroups and the tools Archie, Gopher, Veronica, WAIS (Wide Area Information Server) and the World Wide Web (WWW). Examples will be given to show possible applications for library services.

  13. The National Security Strategy and Transformation of the Hungarian Defense Forces

    Science.gov (United States)

    2007-11-02

    WORD COUNT=6579 16 17 ENDNOTES 1 Ferenc Juhasz Minister of Defense “Interview”; 26 July 2002; available from <http://www.honvedelem.hu/cikk.php?cikk...10263&next=110&archiv =1&next=110 Internet>; Internet; accessed 15 October 2004. 2 “Speech” by Dr. Janos Martonyi, Minister of Foreign Affairs of the...available from <http://www.nato.int/ docu/speech/1999/ s990312c.htm>; Internet; accessed 23 November 2004. Hereafter referred to as Speech by Dr. Janos

  14. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  15. PERAN INTERNATIONAL CIVIL AVIATION ORGANIZATION ATAS PENERBANGAN SIPIL KOMERSIAL INTERNASIONAL DIATAS WILAYAH KONFLIK (STUDI KASUS ATAS PENEMBAKAN PESAWAT MALAYSIA AIRLANES MH17 DI RUANG UDARA UKRAINA 2014)

    OpenAIRE

    Nopansyah, Jaka

    2015-01-01

    This research entitled"The role of the international civil aviation organization on international commercial civil aviation over the area of conflict" (A case study on Malaysia Airlines MH17 flight shooting in the air space of Eastern Ukraine in 2014) The research method used is Normative Research, Library Research at Atmajaya University Yogyakarta, And Internet Media. MH17 Malaysian plane crash in Ukraine 2014, All 298 people on board a Malaysia Airlines plane died after th...

  16. PERAN INTERNATIONAL CIVIL AVIATION ORGANIZATION ATAS PENERBANGAN SIPIL KOMERSIAL INTERNASIONAL DIATAS WILAYAH KONFLIK (STUDI KASUS ATAS PENEMBAKAN PESAWAT MALAYSIA AIRLANES MH17 DI RUANG UDARA UKRAINA 2014)

    OpenAIRE

    2015-01-01

    This research entitled"The role of the international civil aviation organization on international commercial civil aviation over the area of conflict" (A case study on Malaysia Airlines MH17 flight shooting in the air space of Eastern Ukraine in 2014) The research method used is Normative Research, Library Research at Atmajaya University Yogyakarta, And Internet Media. MH17 Malaysian plane crash in Ukraine 2014, All 298 people on board a Malaysia Airlines plane died after th...

  17. Climate Change and Civil Violence

    Science.gov (United States)

    van der Vink, G.; Plancherel, Y.; Hennet, C.; Jones, K. D.; Abdullah, A.; Bradshaw, J.; Dee, S.; Deprez, A.; Pasenello, M.; Plaza-Jennings, E.; Roseman, D.; Sopher, P.; Sung, E.

    2009-05-01

    The manifestations of climate change can result in humanitarian impacts that reverse progress in poverty- reduction, create shortages of food and resources, lead to migration, and ultimately result in civil violence and conflict. Within the continent of Africa, we have found that environmentally-related variables are either the cause or the confounding factor for over 80% of the civil violence events during the last 10 years. Using predictive climate models and land-use data, we are able to identify populations in Africa that are likely to experience the most severe climate-related shocks. Through geospatial analysis, we are able to overlay these areas of high risk with assessments of both the local population's resiliency and the region's capacity to respond to climate shocks should they occur. The net result of the analysis is the identification of locations that are becoming particularly vulnerable to future civil violence events (vulnerability hotspots) as a result of the manifestations of climate change. For each population group, over 600 social, economic, political, and environmental indicators are integrated statistically to measures the vulnerability of African populations to environmental change. The indicator time-series are filtered for data availability and redundancy, broadly ordered into four categories (social, political, economic and environmental), standardized and normalized. Within each category, the dominant modes of variability are isolated by principal component analysis and the loadings of each component for each variable are used to devise composite index scores. Comparisons of past vulnerability with known environmentally-related conflicts demonstrates the role that such vulnerability hotspot maps can play in evaluating both the potential for, and the significance of, environmentally-related civil violence events. Furthermore, the analysis reveals the major variables that are responsible for the population's vulnerability and therefore

  18. Rich Internet Applications

    OpenAIRE

    Farré López, Xavier

    2005-01-01

    El propósito principal de este proyecto es estudiar el origen y funcionamiento de las Rich Internet Applicacions (RIA), que son un nuevo tipo de aplicaciones mucho más óptimas e impactantes que las tradicionales aplicaciones Web. Para llevarlo a cabo primero se ha definido el concepto de aplicación Web y se han expuesto las limitaciones que tienen. El siguiente paso ha sido definir el concepto de Rich Internet Applications y se han listado los objetivos por los que han sido ...

  19. Internet resource pricing models

    CERN Document Server

    Xu, Ke; He, Huan

    2013-01-01

    This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P

  20. Kids rules the internet

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm

    2006-01-01

    ?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....

  1. Recursos de Internet: paleoambiente

    OpenAIRE

    Lorena Grana

    2006-01-01

    World Wide Web o “Telaraña Mundial” ha sido una herramienta esencial en los últimos años para los investigadores y estudiantes frente a la relación, cada vez más inversa, que existe entre la dinámica de publicación y el valor económico para acceder a las mismas. La búsqueda en Internet es literalmente ir deslizándose en una “telaraña”, donde de link a link uno puede ir encontrando interesantes artículos y datos valiosos para orientar nuestras indagaciones. Internet es como una ...

  2. Kids rules the internet

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm

    2006-01-01

    ?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....

  3. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  4. 7 CFR 3017.920 - Civil judgment.

    Science.gov (United States)

    2010-01-01

    ... by verdict, decision, settlement, stipulation, other disposition which creates a civil liability for the complained of wrongful acts, or a final determination of liability under the Program Fraud Civil... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil judgment. 3017.920 Section 3017.920...

  5. 29 CFR 1471.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ..., stipulation, other disposition which creates a civil liability for the complained of wrongful acts, or a final determination of liability under the Program Fraud Civil Remedies Act of 1988 (31 U.S.C. 3801-3812). ... 29 Labor 4 2010-07-01 2010-07-01 false Civil judgment. 1471.920 Section 1471.920 Labor...

  6. 31 CFR 19.920 - Civil judgment.

    Science.gov (United States)

    2010-07-01

    ..., stipulation, other disposition which creates a civil liability for the complained of wrongful acts, or a final determination of liability under the Program Fraud Civil Remedies Act of 1988 (31 U.S.C. 3801-3812). ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Civil judgment. 19.920 Section...

  7. History of Civil Engineering Modal Analysis

    DEFF Research Database (Denmark)

    Brincker, Rune

    2008-01-01

    techniques are available for civil engineering modal analysis. The testing of civil structures defers from the traditional modal testing in the sense, that very often it is difficult, or sometimes impossible, to artificially excite a large civil engineering structure. Also, many times, even though...

  8. CIVILIZATION SCENARIOS OF DEVELOPMENT OF RUSSIA

    Directory of Open Access Journals (Sweden)

    A. N. Kharin

    2013-01-01

    Full Text Available In the modern world plays an important role civilization factor. In this connection beforeRussiaa task stands forming of civilization identity. A problem consists in that, that exists a few scenarios of civilization development. To their consideration and this article is devoted.

  9. History of Civil Engineering Modal Analysis

    DEFF Research Database (Denmark)

    Brincker, Rune

    2008-01-01

    techniques are available for civil engineering modal analysis. The testing of civil structures defers from the traditional modal testing in the sense, that very often it is difficult, or sometimes impossible, to artificially excite a large civil engineering structure. Also, many times, even though...

  10. 14 CFR 1274.924 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... Discrimination Act of 1975 (42 U.S.C. 6101 et seq.), and the NASA implementing regulations (14 CFR parts 1250... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Civil rights. 1274.924 Section 1274.924... FIRMS Other Provisions and Special Conditions § 1274.924 Civil rights. Civil Rights July 2002 Work...

  11. 7 CFR 3560.2 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Civil rights. 3560.2 Section 3560.2 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS General Provisions and Definitions § 3560.2 Civil rights. (a... prohibition under Title VI of the Civil Rights Act of 1964, 42 U.S.C. 2000d and Title VI regulations...

  12. 7 CFR 761.3 - Civil rights.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Civil rights. 761.3 Section 761.3 Agriculture... SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION General Provisions § 761.3 Civil rights. Part 15d of this title contains applicable regulations pertaining to civil rights and filing of discrimination...

  13. 50 CFR 401.22 - Civil rights.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Civil rights. 401.22 Section 401.22..., DEVELOPMENT AND ENHANCEMENT § 401.22 Civil rights. Each application for Federal assistance, grant-in-aid award... Assisted Programs of the Civil Rights Act of 1964 and with the Secretary's regulations...

  14. 30 CFR 881.12 - Civil rights.

    Science.gov (United States)

    2010-07-01

    ... Civil Rights Act of 1964” (43 CFR part 17) and shall give assurances of compliance in such forms as may... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Civil rights. 881.12 Section 881.12 Mineral... LAND RECLAMATION SUBSIDENCE AND STRIP MINE REHABILITATION, APPALACHIA § 881.12 Civil rights. State...

  15. The Transformed Civil Rights Data Collection (CRDC)

    Science.gov (United States)

    Office for Civil Rights, US Department of Education, 2012

    2012-01-01

    Since 1968, the Civil Rights Data Collection (CRDC) has collected data on key education and civil rights issues in our nation's public schools for use by the Department of Education's Office for Civil Rights (OCR), other Department offices, other federal agencies, and by policymakers and researchers outside of the Department. The CRDC has…

  16. Department of Health and Human Services, Office for Civil Rights

    Science.gov (United States)

    ... Z Index About Us Filing with OCR Civil Rights Health Information Privacy Newsroom HHS Home > Office for Civil ... Civil Rights Filing with OCR File a civil rights or health information privacy complaint. Newsroom Read the latest OCR ...

  17. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  18. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  19. Filtering the Internet: The Children's Internet Protection Act. Legal Update

    Science.gov (United States)

    McCarthy, Martha M.

    2004-01-01

    Accompanying the explosive growth of the Internet have been concerns about protecting children from viewing pornographic and other harmful images through cyberspace. In the past few years, Congress has passed several acts to censor Internet sites available to children, but only the Children's Internet Protection Act (CIPA) has received Supreme…

  20. Robert E. Lee as Operational Artist During the American Civil War

    Science.gov (United States)

    2010-04-21

    USMC AY 09-10 Dr. Paul D. Gelpi, Ph . D. Date: 𔃼 t Klf(l.tl.- 1-01 GO Oral Defense C~tte~Y. Shibuya, Ph . D. Approved: Date: 6l.l f+pRrl.... S.of...cases dming the Civil War, the Confederacy carne to the field of battle sorely outnumbered: Union forces 9 totaled over 75,000 while Confederate

  1. AIDS groups challenge Federal Internet censorship law.

    Science.gov (United States)

    1996-05-03

    The Communications Decency Act (CDA), a section of the 1996 telecommunications reform law, bans indecent and patently offensive expression from all online systems available to those under the age of 18. AIDS organizations and the American Civil Liberties Union (ACLU) filed suit in U.S. District Court in Philadelphia, PA,to challenge the law. The ACLU contends that the CDA law is unconstitutional because it criminalizes expression that is protected by the First Amendment, and violates constitutional rights to privacy. The CDA also would impede dissemination of HIV prevention information, according to AIDS online services. Operators of these electronic information systems state that providing explicit language about safe sexual practices is essential if teenagers are to understand how to prevent HIV infection. Additionally, content providers argue that it is almost impossible to know what text or images must be censored in order to avoid government prosecution. Expert witnesses testifying for the U.S. Government stated that there are means available to purge Internet sites of materials that might be regarded as indecent. The ACLU recommends utilizing a software package that would enable parents to control their children's Internet access without requiring broad censorship.

  2. Ageing in civil engineering materials and structures

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Jean-Marc [SETEC TPI, Tour Gamma D 58, quai de la Rapee, 75583 Paris (France)

    2005-07-01

    SETEC TPI will address the 'Aging' topic of the Dijon Symposium by talking about: aging in civil engineering materials and structures, prevention of aging phenomena, in-operation monitoring of degradations related to aging and compensatory measures required to maintain a good safety level. Works as the Millau viaduct, the EdF skyscraper at La Defense - Paris, the renovation of the Grand Palais of Paris and special structures with Monaco's floating dam as well as the 'number 10' shaped gateway boat at Marseilles are illustrations for the issues discussed. The durability of civil engineering structures has become a major concern for designers. The Millau viaduct is designed for a service life of 120 years, and the Monaco dam for 100 years. Calculation rules have been evolving toward the incorporation of the concept of life cycle, for example, the Eurocodes 2 rules (reinforced concrete). The talk will expose the factors which are being taken into account to delay aging versus structure types. This part will be focused towards materials and corresponding regulations: - Reinforced concrete (coating of reinforcements, opening of cracks, choice of reinforcement types), BAEL and Eurocodes 2 rules; - Frame steel (protection, sacrificial anode), CM66 and Eurocodes 3 rules. New materials will also be mentioned: - Ultra high-performance fiber/concrete, with the example of CERACEM applied at Millau for the covering of the toll area barrier; - Titanium, which is starting to appear in the building trades, as for instance for the Beijing China Opera House shell. The second part of the talk will be devoted to a specific case namely, the 'number 10' shaped gateway bridge, a prestressed concrete structure immersed in the Port of Marseilles, which will be used to illustrate the aging phenomenon in a corrosive environment. We will focus on the types of inspection series performed by the Autonomous Port Authority of Marseilles to check the behavior of

  3. Internet Linguistics A Student Guide

    CERN Document Server

    Crystal, David

    2011-01-01

    In this student-friendly guidebook, leading language authority Professor David Crystal follows on from his landmark bestseller, Language and the Internet and takes things one step further. This book presents the area as a new field : Internet linguistics.

  4. The effectiveness of Internet advertising

    OpenAIRE

    Shpekht, Nikita

    2016-01-01

    The work on topic of The effectiveness of Internet advertising focuses on Internet advertising, which we use to advertise products and services, attracting new customers and increase total sales. The first part is presenting the basics of Internet advertising, describing different types of Internet advertising, their possibilities and restrictions. There are also presenting payment models for online advertising. The practical part is procesed on information from theoretical part for p...

  5. Young children as Internet users

    OpenAIRE

    Daramola, O. (Oladipo)

    2015-01-01

    In the current available research concerning the real usage of the internet among the young children, most researchers particularly emphases on the risk and opportunities regarding the active use of the internet. Limited experimental research emphases on the role-based and impact of the parent guidelines in the context. In the current studies, internet parenting methods are well-defined and operationalized to study the influence on the real usage of the internet among children both at home an...

  6. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  7. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  8. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  9. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  10. El proceso civil de "civil law": Aspectos fundamentales

    Directory of Open Access Journals (Sweden)

    Michelle Taruffo

    2006-01-01

    Full Text Available En este artículo el autor analiza los sistemas procesales civiles de civil law y de common law desmarcándose de las tradicionales contraposiciones que la doctrina ha acostumbrado utilizar para la explicación de las diferencias fundamentales existentes entre uno y otro modelo. En efecto, a partir de la constatación de la insuficiencia y en ocasiones inutilidad de estas explicaciones para describir la situación actual de ambos modelos procesales, ensaya el autor un discurso que termina por dar luz a la evolución experimentada por estos sistemas y que, como bien apunta, se ha traducido en un acercamiento que se manifiesta de diversas formas como se ocupa de explicarIn this article the author analyses the procedural law systems of civil law and common law outlining the traditional objections that the doctrine is accustomed to using to explain the existing fundamental differences between one and the other model. In fact, it is from the constatation of the insufficiency and, in occasion the uselessness of these explanations in describing the actual situation of both procedural models, that the author attempts a discourse that in the end sheds light on the evolution experienced by these systems and, as he clearly indicates, has translated into an approximation that manifests in different forms

  11. Internet based benchmarking

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Nielsen, Kurt

    2005-01-01

    We discuss the design of interactive, internet based benchmarking using parametric (statistical) as well as nonparametric (DEA) models. The user receives benchmarks and improvement potentials. The user is also given the possibility to search different efficiency frontiers and hereby to explore...

  12. Internet, Cybersex and Infidelity

    Directory of Open Access Journals (Sweden)

    Verda Tuzer

    2011-03-01

    Full Text Available Increasing use of internet has numerous reflections on relationships. Within the range of chatroom friendship and flirting to shared sexuality, cybersex addiction and criminal behaviours are among the most intriguing. Searching for sexual satisfaction on internet may have a number of functions such as decreasing anxiety and distress; expressing emotions such as loneliness, depression, anger and disappointment; or providing support to not being able to judge the level of intimacy in a realtionship. The incredible ease with which one obtains sexual content on the internet, at home, at the work place or even through mobile phones is one of the most important reason for its widespread prevalence. Another important allure of the cybersex is its anonimity, the relative ease to disguise normally disturbing characteristics and its being mostly ignored by others. It is also low-cost. On the other hand it causes increased social isolation, damages trust in relationships, and causes the individual to seek for help due to dramatic consequences following a period of virtual mirroring, when the feeling of finding a soulmate causes mutual adoration and idealization. This review examines the definition of infidelity in the context of internet use, its characteristics, types and various aspects; its negative consequences on relationships; its effects on couples and families; and treatment alternatives. The problems caused by increasing compulsivity of cybersex are also highlighted.

  13. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2012-01-01

    Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er e...

  14. Trabajo social en internet

    OpenAIRE

    ANONIMO

    2004-01-01

    Este artículo introduce algunos caminos para acceder a información sobre trabajo social en internet, específicamente en relación con las asociaciones y gremios a nivel nacional, regional e internacional. El artículo está dividido en tres partes. La primer

  15. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2008-01-01

     Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  16. Perceptie onderzoek veilig internet

    NARCIS (Netherlands)

    Huveneers, S.G.; Geers, J.M.E

    2009-01-01

    Het programma Digivaardig & Digibewust stimuleert veilig internetgebruik onder haar doelgroepen. Dit onderzoek bestaat uit twee delen. Enerzijds is gekeken wat we weten over de veiligheid van het internet. Met welke dreigingen worden de doelgroep geconfronteerd en welke risico’s lopen zij bij het

  17. Riding the Internet Revolution

    Institute of Scientific and Technical Information of China (English)

    Brendan; McGauley

    2007-01-01

    The days before Internet (BI) seem very distant now like another time in history. At that time, I avoided computers and never thought I would use them. My passion was selling musical gear. Not a very scholarly pursuit, I know, but it kept me out of trouble.

  18. China on the Internet

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The big news on the Web in 2009 No more mobile porn The problem of cellphone pornography has been on the rise with more and more mobile phones that are equipped to surf the Internet coming into the market. Online sites accessible only through mobile phones are becoming a popular new method for distributing porn,

  19. Technology and Internet Connections.

    Science.gov (United States)

    Allen, Denise; Lindroth, Linda

    1996-01-01

    Suggests that teachers can use computer software and Internet connections to enhance curriculum and capitalize student's natural interest in sports and sports figures. Provides a list of activities that students can do in relation to the Olympic games and gives information on how technology can assist in such activities. Appropriate Internet…

  20. Internet Search Engines

    OpenAIRE

    Fatmaa El Zahraa Mohamed Abdou

    2004-01-01

    A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.

  1. Internet Search Engines

    Directory of Open Access Journals (Sweden)

    Fatmaa El Zahraa Mohamed Abdou

    2004-09-01

    Full Text Available A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.

  2. Internet of Things

    Science.gov (United States)

    Ritz, John; Knaack, Zane

    2017-01-01

    In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…

  3. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2012-01-01

    Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  4. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2008-01-01

     Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  5. Intro through Internet Psychology.

    Science.gov (United States)

    Webster, Sandra K.; Kelliher, Thomas P.

    Psychology and computer science were clustered into a course in "Internet Psychology" with the goal of enabling students to use electronic networks responsibly and creatively and to understand the principles of psychology as they operate in the electronic context. Fourteen students from a variety of majors registered for the class.…

  6. STUDYING ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    正Nowadays the Internet is more and more popular.I think it is a good way of learning. First,the Intemet enables people to study whenever and wherever it is convenient. They can also choose to study whatever they are interested in.However,a traditional school doesn't provide such great freedom.Students have to study given sub-

  7. Modeling Internet Topology Dynamics

    NARCIS (Netherlands)

    Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M.

    Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. While recent findings have illustrated the inaccuracies in maps inferred from BGP peering and traceroute measurements, exist

  8. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  9. Reports on internet traffic statistics

    NARCIS (Netherlands)

    Hoogesteger, Martijn; Oliveira Schmidt, de Ricardo; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics fro

  10. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  11. ITSA: Internet Traffic Statistics Archive

    NARCIS (Netherlands)

    Hoogesteger, Martijn; Oliveira Schmidt, de Ricardo; Pras, Aiko

    2016-01-01

    Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on high-level statistics of Internet traffic worldwide. Examples of statist

  12. Children's Strategies on the Internet

    Science.gov (United States)

    Dunkels, Elza

    2008-01-01

    This paper presents the results of an interview study of 104 12-year old children. The aim was to learn more about how children use the Internet, what they find negative on the Internet and what coping strategies they use. The media debate seems to display consensus regarding what threats the Internet poses to young people. However, this study…

  13. Reports on internet traffic statistics

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics

  14. Some Aspects Regarding Internet Advertising

    Directory of Open Access Journals (Sweden)

    Chiţu I.

    2009-12-01

    Full Text Available The aim of this paper is to examine internet advertising, to understand its strengths and weaknesses, to compare the content and potential of traditional media with Web sites and to describe the specific types of internet advertising. The paper also tries to present some facts and figures regarding internet advertising.

  15. Driving the Internet: Mobile Internets, Cars, and the Social

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2012-03-01

    Full Text Available This paper looks at the tandem technologies of cars and the Internet, and the new ways that they are assembling the social with the mobile Internet. My argument is two-fold: firstly, the advent of mobile Internet in cars brings together new, widely divergent trajectories of Internet; secondly, such developments have social implications that vary widely depending on whether or not we recognize the broader technological systems and infrastructures, media practices, flows, and mobilities in which vehicular mobile Internets are being created.

  16. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  17. Internet usage and parents’ views about internet addiction

    Directory of Open Access Journals (Sweden)

    Şemseddin Gündüz

    2011-01-01

    Full Text Available The purpose of this study; families to identify the measures they have taken to avoid students' internet addiction. Families which have children between the ages of 10-18 and an internet connection at home were included in the research. Residing in the central town of Konya with 15 families were interviewed. Each interview lasted approximately 20 minutes. Descriptive analysis was made in the analyzing of data come by at the end of research. In conclusion, the biggest reason for families to connect to the internet is supporting their children to study and preventing their children go to internet cafes. Families said that their children are using the internet to play the game. About half of families agreed verbally with their children about using internet, but any family does not agree in writing. Twelve families do not use any filter program when they connected to internet. Families understand that their children are addicted to the internet, spending more time on the internet, having communication problems with their families, being disruption of daily life patterns, attending classes and failing lessons. If families’ child is addicted to internet many of them warn verbally and say ban the internet, only four of families said get help from experts. Results of research findings compared with literature and discussed.

  18. RISK DEFINITION IN CIVIL UNMANNED AVIATION

    Directory of Open Access Journals (Sweden)

    Volodymyr Kharchenko

    2016-12-01

    Full Text Available Objective: The risks in unmanned civil aviation are considered as one of the most important. In the article is proved applicability of ensuring the flight safety of aircraft and considered the basic risks of manned civil aviation. Methods: Analyzed statistical data on aviation accidents, organized probabilities distribution of aviation accidents for manned and unmanned civil aviation to identify factors that influence the occurrence of emergency situations in manned and unmanned aviation. Results: We proposed typology of risk components in civil aviation and systematized methods and techniques to reduce risks. Over the analogies defined possible risks, their causes and remedies in civil unmanned aircraft. Weight coefficients distribution was justified between risk types for development of recommendations on risk management in unmanned civil aviation. Discussion: We found that the most probable risk in manned civil aviation is the human factor, organization of air traffic control, design flaws of unmanned aviation system as a whole, as well as maintenance of unmanned aviation system.

  19. Practical Guide to Civil Mediation

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that the Département des Institutions of the Republic and Canton of Geneva and the Groupement suisse des Magistrats pour la médiation (GEMME) - Swiss Association of Magistrates for Mediation have published a multilingual Practical Guide to Civil Mediation (including English). In this context, the Swiss Mission has underlined the benefits of resorting to mediation, especially for the personnel of International Organizations, and which the Secretary-General of the GEMME has summarised as follows: it is a private process not requiring the waiver of the parties' immunities; the confidentiality of the mediation process is guaranteed both by the mediator and the parties to it; the search for an amicable settlement does not need to be determined by reference to law (provided that public order is respected); the process is faster (2 to 3 sessions), less costly and more flexible than civil or arbitration procedures; in order to reinforce the agreem...

  20. Practical Guide to Civil Mediation

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that the Département des Institutions of the Republic and Canton of Geneva and the Groupement suisse des Magistrats pour la médiation (GEMME) - Swiss Association of Magistrates for Mediation have published a multilingual Practical Guide to Civil Mediation (including English). In this context, the Swiss Mission has underlined the benefits of resorting to mediation, especially for the personnel of international organizations, and which the Secretary-General of the GEMME has summarised as follows: it is a private process not requiring the waiver of the parties' immunities; the confidentiality of the mediation process is guaranteed both by the mediator and the parties to it; the search for an amicable settlement does not need to be determined by reference to law (provided that public order is respected); the process is faster (2 to 3 sessions), less costly and more flexible than civil or arbitration procedures; in order to reinforce the agreeme...

  1. Geometric procedures for civil engineers

    CERN Document Server

    Tonias, Elias C

    2016-01-01

    This book provides a multitude of geometric constructions usually encountered in civil engineering and surveying practice.  A detailed geometric solution is provided to each construction as well as a step-by-step set of programming instructions for incorporation into a computing system. The volume is comprised of 12 chapters and appendices that may be grouped in three major parts: the first is intended for those who love geometry for its own sake and its evolution through the ages, in general, and, more specifically, with the introduction of the computer. The second section addresses geometric features used in the book and provides support procedures used by the constructions presented. The remaining chapters and the appendices contain the various constructions. The volume is ideal for engineering practitioners in civil and construction engineering and allied areas.

  2. Claims in civil engineering contracts

    CERN Document Server

    Speirs, N A

    1999-01-01

    This paper considers claims arising during civil engineering construction contracts. The meaning of the word 'claim' is considered and its possible implications for additional cost and time to completion. The conditions of the construction contract selected will influence the risk apportionment between contractor and client and the price offered by the contractor for the work. Competitive bidding constraints and profit margins in the construction industry, however, may also influence the price offered. This in turn can influence the likelihood of claims arising. The client from his point of view is concerned to complete the work within an agreed time and budget. The circumstances under which claims may arise are reviewed in relation to typical conditions of contract. These circumstances are then related to the CERN LHC civil works. Ways of avoiding claims, where this is possible, are considered. Finally, the means of evaluation of claims and their settlement are considered.

  3. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 10

    Science.gov (United States)

    2005-10-01

    renewable systems are being deployed by telephone companies for new, always-con- nected applications such as Internet Protocol Television ( IPTV ), where...Survivable Information Systems Designing survivability measures into an information system from the start allows continued operations through failure...Information Technology Security Arms Race This author discusses how an intrusion prevention system can fill the need for new technology defenses to

  4. Sociedad civil y capital social

    Directory of Open Access Journals (Sweden)

    José Fernández Santillán

    2009-01-01

    Full Text Available Este documento aborda el tema de la democracia desde una perspectiva opuesta al llamado neoinstitucionalismo; es decir, se orienta a analizar los procesos de democratización desde la base de la sociedad civil y, en es pe cial, desde lo que se conoce como el cap i tal so cial. Desde mediados de la década de 1980, el tema de la democracia desde la perspectiva de la sociedad civil fue cobrando cada vez mayor relevancia. Esta tendencia se vio reforzada por la caída del Muro de Berlín el 9 de noviembre de 1989, cuando se dijo que el fac tor fun da men tal de la liberación de los países del Este europeo fue, precisamente, la sociedad civil. Lo que aquí se hace es abordar el tema desde una perspectiva teórica que toca lo mismo a los clásicos del pensamiento político como Hegel, Tocqueville, Marx y Gramsci, que a autores contemporáneos como Jean Co hen, An drew Arato, Marc War ren y Axel Honneth. Respecto al tema del cap i tal so cial se aborda particularmente el pensamiento de Rob ert D. Putnam, quien sostiene que la base de la democracia y el desarrollo económico es el fortalecimiento de las redes de confianza en la sociedad civil. Este ensayo es crítico tanto del mencionado neoinstitucionalismo como del comunitarismo y del patrimonialismo.

  5. [Civil bioethics in pluralistics societies].

    Science.gov (United States)

    Cortina, A

    2000-01-01

    The author examines how Bioethics should be approached in a pluralist society. She argues that through the gradual discovery of shared ethical values and principles for judging which practices are humanizing and which or not, ever-more dense civil Bioethics helps bring out--in contrast to relativism and subjectivism--an ethical intersubjectiveness, the fundaments of which should be addressed by moral philosophy if it hopes to fulfill one of its main tasks.

  6. Entering the Internet Race: The Early Years of the Internet and Internet Commerce in Japan

    OpenAIRE

    Carin Holroyd

    2005-01-01

    Ten years ago, Japan lagged well behind in the race to capitalize on the commercial and other possibilities of the Internet. Cumbersome government regulations and an Internet-averse business community combined with aspects of Japanese society to make the Internet less compelling in Japan than other countries. The advent of the mobile Internet resulted in an exponential growth in Japanese e-commerce and m-commerce, vaulting the country into the world lead in the development of profitable Inter...

  7. The Celestial Basis of Civilization

    Science.gov (United States)

    Masse, W. B.

    Scholars have long puzzled over the reasons for the ubiquity of celestial images in the residue of the world's earliest civilizations: in art, myth, religious cosmology, iconography, cosmogony, eschatological beliefs, and as portents for the conduct of royal and chiefly power. The general consensus is that these images represented a need by early societies to use the fixed celestial heavens in order to regulate ritual and agricultural cycles, and to satisfy a psychological need by people to relate themselves to their surrounding Universe. Such explanations are facile and miss an important aspect of the celestial heavens. The fixed celestial heavens served as the back-drop for a large number of often spectacular temporary naked-eye visible celestial events which animated the night and sometimes the daytime sky, and which created an 'otherworld' for virtually all cultural groups. In this paper I present a model derived from the detailed analysis of Hawaiian oral traditions and culture history in relation to historic astronomical records of temporary celestial events, and then apply this model to cultural traditions from Mesoamerica and other geographic regions in order to demonstrate that novae, supernovae, variable stars, comets, great meteor showers, aurorae, solar and lunar eclipses, and impacting Solar System debris, together played a critical role in the artistic, intellectual, and political development of early civilizations. These data not only provide important insights into the development of civilization, but also provide important details and longitudinal records of astronomical events and phenomena which are otherwise not readily available for scientific scrutiny.

  8. Narcissism and Internet pornography use.

    Science.gov (United States)

    Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton

    2015-01-01

    This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.

  9. Governos, Empresas, Wikileaks e Governança da Internet

    Directory of Open Access Journals (Sweden)

    SELAIMEN, Graciela B.

    2011-08-01

    Full Text Available The WikiLeaks case is a concrete example of how close are the relationships between governments and private companies - a process that undermines democracy and questions the willingness of governments to act primarily on behalf of public interest. In this work we offer, analyzing the WikiLeaks episode in the end of 2010 from a regulatory a political perspective, a brief summary of the responses that emerged in one of the main spaces of discussion on the global governance of the Internet - the IGC, the Civil Society Caucus for Internet governance - in its attempt to respond to the complexity of the dispute over surveillance, control, freedom and autonomy in cyberspace.

  10. TO THE QUESTION OF STUDYING OF THE PROBLEM OF CIVIL ACTIVITY IN RUSSIA

    Directory of Open Access Journals (Sweden)

    A. P. Noskov

    2016-01-01

    Full Text Available In the article features of civil activity of the Russian population and some mechanisms of its implementation are considered. Interest in research of civil activity in modern political process is caused by its interrelation with formation of effective institutes of interaction of the government and society. Intelligent association of the population on purpose selfrealization in socio-political process causes public activity, which, in turn, is aimed at the development of the democratic constitutional state. In general, at the present stage in the Russian Federation quality of participation of citizens changes and new mechanisms of implementation of civil activity develop. Important (at the moment even the main role is played by the state, which acts as the initiator of reformatory process of an institutionalization of interaction of civil society and government. In the last decade the Government of the Russian Federation has offered two large projects aimed at the development of civil society, is a Civic chamber and the Russian Popular Front. One of innovative mechanisms is the Internet where the initiative is shown by means of the websites, social networks, crowdfunding and crowd-sourcing platforms, etc. However, participation of the Russian citizens in social and political life isn't characterized by high activity that is caused by feature of national mentality.

  11. Internet addiction in young people.

    Science.gov (United States)

    Ong, Say How; Tan, Yi Ren

    2014-07-01

    In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.

  12. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  13. Internet Addiction and Its Treatment

    Directory of Open Access Journals (Sweden)

    Ozden Arisoy

    2009-07-01

    Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.

  14. Preliminary discussion on “Internet +” sponge city modular construction system

    Science.gov (United States)

    Yang, Jinhui; Kang, Sijun; Luo, Weizu; Dai, Yanghong; Yang, Bing

    2017-08-01

    To promote the construction of ecological civilization and the process of urbanization in China, in 2013, the government propose to build an innovative rainwater system, which is characterized by nature accumulation, natural penetration and natural purification——low impact development of rainwater. This article Summarizes the research status of sponge city. It can be help the sponge city to become intelli-gent and modular creatively by adding the intelligent concept of “internet+” and the modular concept into the sponge city. This article first introduces the “internet+” concept of sponge city, and then discussed the application of the “internet+” and modular concept in sponge city from the three stage of construction, management and performance evaluation, in order to provide some reference and revelation for the development of modular of “internet+” sponge city.

  15. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  16. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  17. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  18. Interpretation of Internet technology

    DEFF Research Database (Denmark)

    Madsen, Charlotte Øland

    2001-01-01

    -cognitive competencies of organisations (Rindova & Fombrunn, 1999). The aim is to contribute to the existing technological implementation theory complex by studying the relationships between the elements of the socio-cognitive processes and the resulting interpretations and actions when new technologies are implemented......Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic...... processes leading to the use of internet marketing technologies and to investigate how these new technologies are interpreted into the organisation. Investigating the organisational socio-cognitive processes underlying the decision making processes will give further insight into the socio...

  19. Internet and Advertisement.

    Science.gov (United States)

    Moustafa, Khaled

    2016-02-01

    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an (e-) prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are also flourishing through for example misleading online advertising methods. Some social and professional networks gather users' profiles for selling and advertising purposes, sometimes by making it technically difficult to unsubscribe. Here, I discuss some of these unethical aspects and propose some potential solutions to reduce them.

  20. Internet de las cosas

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2016-01-01

    Este es un curso de introducción a la IoT (Internet de las cosas). En los capítulos primeros capítulos se introducen los conceptos básicos sobre la IoT. Seguidamente se presentan nociones básicas sobre el protocolo de internet IPv6 que es el más utilizado en el entorno de la IoT y se describen las principales aplicaciones, el estado actual del mercado y las tecnologías que permiten la existencia de la IoT. Finalmente se analizan los retos de futuro que se consideran más importa...

  1. Internet en service pack

    Directory of Open Access Journals (Sweden)

    Máximo Lameiro

    2004-04-01

    Full Text Available En contra de los sueños románticos que, no hace tantos años, muchos albergamos, Internet se ha convertido en un inmenso mercado en el cual es cada vez más difícil encontrar alguna cosa genuina y del que es cada vez más improbable salir ileso. La Internet de hoy es tan distinta de lo que fue que poca gente recuerda cómo se gestó y cual era su 'espíritu' en los comienzos. La Red de redes fue el resultado de un proceso, no previsto, que empezó como red militar, siguió como red universitaria, luego alcanzó nivel intercontinental y finalmente se globalizó tanto como el mundo al que ella misma contribuyó a unificar.

  2. Instability and internet design

    Directory of Open Access Journals (Sweden)

    Sandra Braman

    2016-09-01

    Full Text Available Instability - unpredictable but constant change in one’s environment and the means with which one deals with it - has replaced convergence as the focal problem for telecommunications policy in general and internet policy in particular. Those who designed what we now call the internet during the first decade of the effort (1969-1979, who in essence served simultaneously as its policy-makers, developed techniques for coping with instability of value for network designers today and for those involved with any kind of large-scale sociotechnical infrastructure. Analysis of the technical document series that was medium for and record of that design process reveals coping techniques that began with defining the problem and went on to include conceptual labour, social practices, and technical approaches.

  3. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  4. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  5. Which Air Force Civil Engineer Capabilities Can Complement USNORTHCOM’s Role in Defense Support to Civil Authorities (DSCA)?

    Science.gov (United States)

    2014-05-21

    fixed wing or rotary wing aircraft, airfield/landing zone under Visual Flight Rules (VFR) and Instrument Flight Rules ( IFR ) conditions for multiple...wing aircraft, airfield/landing zone under Visual Flight Rules (VFR) and Instrument Flight Rules ( IFR ) conditions for multiple aircraft types on small...under Visual Flight Rules (VFR) and Instrument Flight Rules ( IFR ) conditions for multiple aircraft types on small to large temporary/ permanent

  6. Which Air Force Civil Engineer Capabilities Can Complement USNORTHCOM’s Role in Defense Support to Civil Authorities (DSCA)?

    Science.gov (United States)

    2014-05-21

    BASED AND/OR PORTLAND CEMENT BASED PAVEMENTS WITH SEMI-PERMANENT MATERIALS TO INCLUDE LIMITED JOINT SEALING. KIT CONSIST OF (5) 8’X 20’ ISO CONTAINERS... techniques , and procedures (TTPs). Additionally, the intent of this thesis is not to advocate for additional DSCA mission taskings for the Air Force...

  7. From Internet to Posthuman

    Directory of Open Access Journals (Sweden)

    Alberto Giovanni Biuso

    2015-04-01

    Full Text Available The social-interactive nature of the human being has produced different political, ethical, and technological structures. The Internet is one of them. A thorough understanding of the World Wide Web’s role, potentiality and risks surely requires sound sociological, psychological and cognitive paradigms but it always and above all requires a radical theoretical look at human and posthuman exists and acts on the web and its devices.

  8. Internet: alternativa educativa

    Directory of Open Access Journals (Sweden)

    José Francisco Amador Montaño

    2015-02-01

    Full Text Available RESUMEN Este artículo presenta una propuesta sobre la utilización de las potencialidades de Internet en la educación. Es una reflexión sobre el qué hacer y la responsabilidad d elas instituciones educativas y de los docentes frente a los retos cotnemporáneos que ofrece la tecnología y la ciencia.

  9. Treatment of internet addiction.

    Science.gov (United States)

    Huang, Xui-qin; Li, Meng-chen; Tao, Ran

    2010-10-01

    Internet addiction (IA) is a prevalent, highly comorbid, and significantly impairing disorder. Although many psychotherapeutic approaches and psychotropic medications have been recommended and some of the psychotherapeutic approaches and a few pharmacotherapy strategies have been studied, treatment of IA is generally in its early stages. This article reviews theoretical descriptions of psychotherapy and the effects of psychosocial treatment and pharmacologic treatment. We also outline our own treatment model of IA.

  10. Optimal Internet Media Selection

    OpenAIRE

    Peter J. Danaher; Janghyuk Lee; Laoucine Kerbache

    2010-01-01

    In this study we develop a method that optimally selects online media vehicles and determines the number of advertising impressions that should be purchased and then served from each chosen website. As a starting point, we apply Danaher's [Danaher, P. J. 2007. Modeling page views across multiple websites with an application to Internet reach and frequency prediction. (3) 422–437] multivariate negative binomial distribution (MNBD) for predicting online media exposure distributions. The MNBD is...

  11. Validation of the Internet Addiction Test in Students at a Pakistani Medical and Dental School.

    Science.gov (United States)

    Waqas, Ahmed; Farooq, Faisal; Raza, Mohsin; Javed, Saamia Tahir; Khan, Spogmai; Ghumman, Mahrukh Elahi; Naveed, Sadiq; Haddad, Mark

    2017-08-17

    Despite growing concerns over pathological internet usage, studies based on validated psychometric instruments are still lacking in Pakistan. This study aimed to examine the psychometric properties of the Internet Addiction Test (IAT) in a sample of Pakistani students. A total of 522 students of medicine and dentistry completed the questionnaire, which consisted of four sections: (a) demographics, (b) number of hours spent on the Internet per day, (c) English version of the IAT, and (d) the Defense Style Questionnaire-40. Maximum likelihood analysis and principal axis factoring were used to validate the factor structure of the IAT. Convergent and criterion validity were assessed by correlating IAT scores with number of hours spent online and defense styles. Exploratory and confirmatory factor analysis reflected the goodness of fit of a unidimensional structure of the IAT, with a high alpha coefficient. The IAT had good face and convergent validity and no floor and ceiling effects, and was judged easy to read by participants.

  12. The Internet of Things

    CERN Document Server

    Greengard, Samuel

    2015-01-01

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...

  13. An international landmine telehealth symposium between Hawaii and Thailand using an Internet2 and multi-protocol videoconferencing bridge.

    Science.gov (United States)

    Soh, Eugene K; Vincent, Dale S; Berg, Benjamin W; Chitpatima, Suwicha T; Hudson, Donald H

    2004-10-01

    An international telehealth symposium was conducted between healthcare institutions in Hawaii and Thailand using a combination of Asynchronous Transfer Mode, and Internet2 connectivity. Military and civilian experts exchanged information on the acute and rehabilitative care of landmine victims in Southeast Asia. Videoconferencing can promote civil-military cooperation in healthcare fields that have multiple international stakeholders.

  14. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  15. ATLAS Civil Engineering Point 1

    CERN Multimedia

    Jean-Claude Vialis

    1998-01-01

    Different phases of realisation to Point 1 : zone of the ATLAS experiment After watching this film you can get the view of the civil engineering work at POINT1 where the ATLAS will be built. 03-11-1998 The video starts with the view of the POINT1 taken from the roof of the building 33. 04-11-1998 View of the installation of the entrance of the SDX1 18/19-11-1998 Installation of the rafters to the building PX15

  16. Gandhi, Civilization, Non-Violence and Obama

    OpenAIRE

    Tamer Söyler

    2010-01-01

    How should we understand Gandhi’s commitment to nonviolence?After discussing and refuting the idea that Gandhi’s conceptionof non-violence can be treated merely as a method to stand up toaggression, its embedment in a concept of true civilization is examined. It is argued that the important nuances between the definitions of civilization in the Gujarati and the English versions of Gandhi’s seminal work Hind Swaraj (1909) reveal Gandhi’s conception of civilization.

  17. COMPULSORY INSURANCE OF CIVIL LIABILITY IN RUSSIA

    Directory of Open Access Journals (Sweden)

    M. Malik

    2014-03-01

    Full Text Available The article outlines the main trends of compulsory insurance of civil liability in Russia : problems, trends and prospectsInsurance of civil liability – one of the popular forms of distribution and security in the world. The essence of compulsory insurance of civil responsibility is to protect the property interests of individuals. The development of liability insurance goes along with technological progress and reinforced by various laws and regulations, it touches almost all areas of life.

  18. COMPULSORY INSURANCE OF CIVIL LIABILITY IN RUSSIA

    OpenAIRE

    Malik, M.; I. Semenchuk

    2014-01-01

    The article outlines the main trends of compulsory insurance of civil liability in Russia : problems, trends and prospectsInsurance of civil liability – one of the popular forms of distribution and security in the world. The essence of compulsory insurance of civil responsibility is to protect the property interests of individuals. The development of liability insurance goes along with technological progress and reinforced by various laws and regulations, it touches almost all areas of life.

  19. Civil service reform and the World Bank

    OpenAIRE

    Nunberg, Barbara; Nellis, John

    1990-01-01

    The emphasis placed by the World Bank in recent years on the major overhaul of developing country economies has accentuated the importance of adequate public sector administrative capacity, especially within the central core of government, that is, the civil service. This paper surveys recent Bank experience in civil service reform, and begins to assess the progress made. The paper focuses on two separate but related aspects of civil service reform work. One deals with the shorter term, emerg...

  20. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  1. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  2. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the agreement approbation between the French Republic Government and the Russian Federal Government relative to the civil liability concerning the nuclear damages occurring from goods supplying to nuclear facilities in Russian Federation and becoming from the French Republic; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees sur le projet de loi autorisant l'approbation de l'accord entre le Gouvernement de la Republique francaise et le Gouvernement de la Federation de Russie relatif a la responsabilite civile au titre de dommages nucleaires du fait de fournitures en provenance de la Republique francaise destinees a des installations nucleaires en Federation de Russie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    The first part presents the international civil liability system in the nuclear domain and details then the 20 june 2000 agreement. It presents also the main aspects of the french-russian cooperation in the nuclear domain. (A.L.B.)

  3. The orthodontist’s civil responsibility post-orthodontic therapy

    Directory of Open Access Journals (Sweden)

    Mayury Kuramae

    2008-01-01

    Full Text Available Objective: The aim of this work was to investigate what the orthodontist’s difficulties are, analyzing whether the adopted procedures are able to satisfy the complaints of individuals, who already concluded orthodontic therapy, according to the determinations of the civil code and the Costumer’s Defense Code, as well as the relationship between patient and professional. Methods: A questionnaire was sent by postal service to all the odonthology specialists inrolled in the CRO/RJ amounting to 990 professionals.Results: The percentual analysis of the analysis showed that 96.9% of them adopt some pattern of kind of contract. The majority (65.8%regards the orthodontist’s Civil Responsibility as a result. In case of reincident postrentation, 87.2% of the professionals inform the individual that it’s possible and also propose them orthodontic re-treatment. Concerning the conduct adopted by the orthodontist towards the individual’s dissatisfaction, 76.5%, anyhow, try to avoid a lawsuit. Conclusion: Some professionals may be subject to future court problems, there was wide divergence between professionals in relation to the time of filing of the orthodontic documentation and there was a relative same opinion of professionals in making an oversight of the patient in the period post-restraint.

  4. Comunicación, internet y democracia deliberativa en el 15M

    OpenAIRE

    Candón-Mena, José Ignacio

    2014-01-01

    El uso activista de las nuevas tecnologías de la información y comunicación (TIC) resulta cada vez más determinante en las prácticas, propuestas e imaginarios de los movimientos sociales y la sociedad civil. Pero el papel de internet y las nuevas tecnologías va mucho más allá de la evidente utilidad de las redes para la convocatoria de la movilización que dio origen al 15M. Las redes sociales e internet forman también parte del entramado comunicativo en el que se constata la injusticia percib...

  5. Comunicación, internet y democracia deliberativa en el 15M

    OpenAIRE

    Candón-Mena, José Ignacio

    2014-01-01

    El uso activista de las nuevas tecnologías de la información y comunicación (TIC) resulta cada vez más determinante en las prácticas, propuestas e imaginarios de los movimientos sociales y la sociedad civil. Pero el papel de internet y las nuevas tecnologías va mucho más allá de la evidente utilidad de las redes para la convocatoria de la movilización que dio origen al 15M. Las redes sociales e internet forman también parte del entramado comunicativo en el que se constata la injusticia percib...

  6. Radio communications with extra-terrestrial civilizations

    Science.gov (United States)

    Kotelnikov, V. A.

    1974-01-01

    Communications between civilizations within our galaxy at the present level of radio engineering is possible, although civilizations must begin to search for each other to achieve this. If an extra-terrestrial civilization possessing a technology at our level wishes to make itself known and will transmit special radio signals to do this, then it can be picked up by us at a distance of several hundreds of light years using already existing radio telescopes and specially built radio receivers. If it wishes, this civilization can also send us information without awaiting our answer.

  7. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  8. INTERNET AND EFL READING CLASSES

    Institute of Scientific and Technical Information of China (English)

    Fatemeh; Alipanahi

    2005-01-01

    The Internet is all about sharing ideas with others. It offers a myriad of authentic materials and ampleopportunities to communicate in the foreign language. It fits into current theories of communicative languagelearning and learner autonomy. This paper attempts to address the major issues teachers and universities willencounter when integrating the Internet into foreign language curriculum, and it is mostly concerned with theeffect of Internet on teaching reading comprehension. Therefore, the main purpose of this study is to findjustifiable responses to the following questions.1. Will the student improve their attitude toward reading comprehension in English as a foreign language(EFL) after being taught via the Internet?2. Will the teaching of reading comprehension via Internet yield significantly better results thantraditional, non-Internet techniques?This paper can be good starting point for EFL instructors and universities alike, and as such it explores anumber of major issues and provides both theoretical background information and practical suggestions.

  9. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... Technologies that brought massive change in the ways people communicate and how information is exchanged across the globe. Educational sector has been strongly influenced by the emergence of Internet Technologies. Digital literacy is a prerequisite for students of this generation. Studies say that woman always...... and a research design was formulated in consultation with the participants. Action research model for reflective Internet searching developed by Edwards and Bruce (2002) was deployed in the study where students did the Internet searching based on the action research cycle of planning, acting, recording...

  10. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  11. Internet Ethnography: Online and Offline

    Directory of Open Access Journals (Sweden)

    Liav Sade-Beck

    2004-06-01

    Full Text Available This article proposes a new methodology for qualitative research on the Internet, based on the integration of qualitative data-gathering methodologies both online and offline. This combination enables the creation of rich ethnography or, as Geertz (1973 has called it, “thick description,” not limited to the Internet alone. The importance of this article lies in its contribution to a better understanding of the research potential of the Internet and its implementation in qualitative research methodologies.

  12. The Economics of Internet Media

    OpenAIRE

    Peitz, Martin; Reisinger, Markus

    2014-01-01

    We survey the economics literature on media as it applies to the Internet. The Internet is an important driver behind media convergence and connects information and communication technologies. While new Internet media share some properties with traditional media, several novel features have appeared: On the content side, aggregation by third parties that have no editorial policy and user-generated content have become increasingly important. On the advertiser side, fine-tuned tailoring and tar...

  13. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  14. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  15. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  16. Cyber Defense Exercises and their Role in Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Bogdan Alexandru Bratosin

    2014-06-01

    Full Text Available The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exercises (CDX are by far the most complex and up to date methods of training the next generation of IT security specialists.

  17. Does the Internet Reduce Corruption?

    DEFF Research Database (Denmark)

    Andersen, Thomas Barnebeck; Bentzen, Jeanet Sinding; Dalgaard, Carl-Johan Lars

    2011-01-01

    We test the hypothesis that the Internet is a useful technology for controlling corruption. In order to do so, we develop a novel identification strategy for Internet diffusion. Power disruptions damage digital equipment, which increases the user cost of IT capital, and thus lowers the speed...... and a large cross section of countries. Empirically, lightning density is a strong instrument for Internet diffusion and our IV estimates suggest that the emergence of the Internet has served to reduce the extent of corruption across U.S. states and across the world....

  18. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  19. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  20. Interpretation of Internet technology

    DEFF Research Database (Denmark)

    Madsen, Charlotte Øland

    2001-01-01

    Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic....... Additionally, the project will investigate the technological strategies in organisations in order to gain a deeper understanding of the cognitive barriers towards implementing new technology in organisations. The research will therefore concentrate on the development process in the organisation's perception...

  1. INTERNET: WEB BROWSER

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Web browser merupakan alat bagi pengguna untuk melakukan penelusuran di lingkungan Internet baik berupa teks (hypertext maupun gambar, suara atau video (hypermedia yang tersusun secara sistematis dalam suatu Web. Dokumen/teks tersebut sering terdiri dari beberapa halarnan atau bahkan hanya 1 halaman, saling berhubungan dengan dokumen lain melalui tanda tertentu (hyperlink yang biasanya berbentuk huruf-huruf yang berwama lain dan lebih bercahaya atau 'highlighted'. Pengguna yang tertarik untuk mengetahui informasi dari dunia hiburan sampai dengan ilmu pengetahuan, cukup menunjuk dan menekan tombol mouse pada bagian tersebut dalam Web browser, sehingga tampilan akan berpindah dari dokumen satu ke dokumen lain.

  2. A escola na internet

    OpenAIRE

    Albino, Ayrán Lavra

    2003-01-01

    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Engenharia de Produção. O presente trabalho pretendeu analisar o uso do suporte tecnológico do ensino a distância (computador e internet) como elemento complementar do ensino presencial. Procurou-se demonstrar, na fundamentação teórica, que as tendências pedagógicas contemporâneas e as características da tecnologia digital viabilizam esta possibilidade. Operacionalizou-se essa ...

  3. The Internet Pollution

    Institute of Scientific and Technical Information of China (English)

    唐宁宁

    2005-01-01

    Life today has brought new problems. As we know, there are fourterrible pollutions in the world: water pollution, noise pollution, air pol-lution and rubbish pollution. Water pollution kills our fish and pollutesour drinking water. Noise pollution makes us talk louder and become angry more easily. Air pollution makes us hold our breath longer and be badto all living things in the world. Rubbish pollution often makes our livingenvironment much dirtier. But I think that the Internet pollution is anothernew pollution in the world.

  4. Internet congestion control

    CERN Document Server

    Varma, Subir

    2015-01-01

    Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of applic

  5. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  6. Recursos de Internet: "Arqueometalurgia"

    Directory of Open Access Journals (Sweden)

    Nicolás Ciarlo

    2007-12-01

    Full Text Available Continuando con la serie de apartados sobre la información disponible en Internet, debido a la reconocida importancia de la misma para la investigación durante los últimos años, presentamos algunos de los sitios sobre grupos y proyectos en arqueometalurgia (prehistórica e histórica, artículos generales sobre el tema, varios casos de estudio de Argentina, y algunas páginas de metalurgia histórica.

  7. Towards a quantum internet

    Science.gov (United States)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  8. Older Adolescent's Perceptions of Personal Internet Use

    Science.gov (United States)

    Koff, Rosalind N.; Moreno, Megan A.

    2013-01-01

    Internet use is widespread among the older adolescent population. Given the pervasiveness and frequency of internet use, concerns have been raised regarding the impact of excess internet use on adolescent health. In order to understand the impact of internet use on health, we must have accurate and reliable measures of internet use. This study…

  9. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  10. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  11. Contemporary Chinese Defense Industry Reforms and Civil–Military Integration in Three Key Organizations

    OpenAIRE

    Francis, Ed; Puska, Susan M

    2010-01-01

    This brief highlights key points on three Chinese government and military organizations involved in managing defense science, technology, and industry: 1) the State Council’s State Administration for Science, Technology and Industry for National Defense (SASTIND); 2) the General Armament Department (GAD) of the People’s Liberation Army; and 3) the Ministry of Industry and Information Technology’s Civil–Military Integration Promotion Department (CMIPD). This brief calls attention to im...

  12. Campaigning on the Internet: 2008 Presidential General Election Candidate Webpage

    Directory of Open Access Journals (Sweden)

    William L. Benoit

    2016-12-01

    Full Text Available The Internet is becoming an increasingly important component of political campaigns. This study employed content analysis to apply Functional Theory and Issue Ownership Theory to Obama’s and McCain’s presidential candidate webpages in the 2008 campaign. Acclaims (92% were more common than attacks (98%; defenses did not occur in this sample. Policy (82% was addressed more than character (18%. When discussing policy, these candidates addressed future plans most frequently, followed by general goals and then past deeds; on character, candidates discussed ideals, then personal qualities, and then leadership ability. This study shows that as candidates use the Internet to reach voters, their webpages conform to theoretical expectations.

  13. [Excessive Internet use and Internet addiction: emerging public health issues.].

    Science.gov (United States)

    Coniglio, Maria Anna; Muni, Viviana; Giammanco, Giuseppe; Pignato, Sarina

    2007-01-01

    A survey was performed among students of various faculties at the University of Catania (Italy) to examine the health effects of excessive Internet use and behaviour patterns of Internet dependency. Three hundred students were recruited through a non probabilistic quota sampling method and were asked to complete a questionnaire aimed at identifying attitudes and behaviours regarding Internet use, and the psychological and physical consequences of excessive use of the Internet. The most relevant findings that emerged from student responses regard: emotional dependency on the Internet (5% of students believe that Internet facilitates social relationships, 4% experiences euphoric feelings or excitement while on-line, 1% consider the Internet as a way of escaping from real life), the excessive amount of time spent on-line (8%) and the inability to end an on-line session(8%), lying to family members to conceal the nature of involvement with the Internet (3%), giving up sports (2%) or meals (1%), the negative impact on school grades (3%), lack of sleep (4%), and physical health problems such as backache (2%), arm or wrist pain (2%), vision disturbances (6%).

  14. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    Deursen, van Alexander J.A.M.; Courtois, Cédric; Dijk, van Jan A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills actua

  15. A Novel Cyber-Insurance for Internet Security

    CERN Document Server

    Pal, Ranjan; Psounis, Konstantinos

    2011-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

  16. TOWARDS: 3D INTERNET

    Directory of Open Access Journals (Sweden)

    Ms. Swapnali R. Ghadge

    2013-08-01

    Full Text Available In today’s ever-shifting media landscape, it can be a complex task to find effective ways to reach your desired audience. As traditional media such as television continue to lose audience share, one venue in particular stands out for its ability to attract highly motivated audiences and for its tremendous growth potential the 3D Internet. The concept of '3D Internet' has recently come into the spotlight in the R&D arena, catching the attention of many people, and leading to a lot of discussions. Basically, one can look into this matter from a few different perspectives: visualization and representation of information, and creation and transportation of information, among others. All of them still constitute research challenges, as no products or services are yet available or foreseen for the near future. Nevertheless, one can try to envisage the directions that can be taken towards achieving this goal. People who take part in virtual worlds stay online longer with a heightened level of interest. To take advantage of that interest, diverse businesses and organizations have claimed an early stake in this fast-growing market. They include technology leaders such as IBM, Microsoft, and Cisco, companies such as BMW, Toyota, Circuit City, Coca Cola, and Calvin Klein, and scores of universities, including Harvard, Stanford and Penn State.

  17. Internet y salud

    Directory of Open Access Journals (Sweden)

    Hugo Villegas de Olazával

    2000-03-01

    Full Text Available Internet y las redes de telecomunicación tienen un uso creciente en informática, desarrollo de recursos humanos, y educación médica continua. En este artículo se presentan los recursos que pueden ser utilizados para fortalecer los procesos de búsqueda de información, difundir documentos básicos, guías clínicas y de procedimientos; utilizar correo electrónico, participar en discusión de grupos, teleconferencias y telemedicina; y efectuar análisis e investigación. Las bibliotecas virtuales permiten interacción efectiva, y los procesos de educación continua constituyen elementos fundamentales en la actualización del conocimiento, en beneficio de la población. Asimismo, los sistemas de información sanitaria, de registro individual computarizado, de la práctica administrativa en los servicios e instituciones de salud; como la vigilancia epidemiológica de las enfermedades, de los factores de riesgo, de los desastres, forman parte de la permanente preocupación por la salud pública. El desafío por el control de calidad y la eficiencia en la entrega de servicios informáticos a la población seré el eje del futuro. Internet constituye un elemento básico en el proceso de desarrollo general.

  18. REKONSTRUKSI PEMBENTUKAN NATIONAL CYBER DEFENSE SEBAGAI UPAYA MEMPERTAHANKAN KEDAULATAN NEGARA

    Directory of Open Access Journals (Sweden)

    Nur Khalimatus Sa'diyah

    2016-09-01

    Full Text Available Anxiety against cybercrime has become the world’s attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country’s defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country’s sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world’s bulwark cyber or cyber defense.

  19. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  20. The Brazilian Approach to Internet Intermediary Liability: Blueprint for a Global Regime?

    OpenAIRE

    Nicolo Zingales

    2014-01-01

    While intermediary liability is becoming an issue of increasing importance in internet governance discussions, little is being made at the institutional level to minimise conflicts across jurisdictions and ensure the compliance of intermediary liability laws with fundamental rights and the freedom to innovate. The experience leading to the adoption of the Brazilian “Marco Civil da Internet” offers concrete insights for the definition of a baseline framework at the international level. This ar...